More Subjects
Risk Assessment Paper
Malintha Liyanage
Institution
Table of Contents
TOC \o "1-3" \h \z \u Abstract PAGEREF _Toc17710812 \h 3
Proposal PAGEREF _Toc17710813 \h 4
Asset Inventory and Priority PAGEREF _Toc17710814 \h 4
Network Topology Assessment PAGEREF _Toc17710815 \h 6
Network Authentication PAGEREF _Toc17710816 \h 9
Risk Assessment PAGEREF _Toc17710817 \h 10
Vulnerabilities PAGEREF _Toc17710818 \h 11
Remote Configuration Management PAGEREF _Toc17710819 \h 12
Analyze Wireless Traffic PAGEREF _Toc17710820 \h 14
Conclusion PAGEREF _Toc17710821 \h 15
Executive Summary PAGEREF _Toc17710822 \h 17
References PAGEREF _Toc17710823 \h 20
Abstract
Finance and banking companies are most vulnerable to attacks and 64 percent of cyber-attacks are for financial gains. Remaining 36 percent is for getting sensitive information of clients CITATION BCa04 \l 1033 (B Cashell, 2004). Global Finance Incorporation (GFI) has also been a victim of cybersecurity attacks, in 2013 they lost their customer database as result of attack on their Oracle database. Similarly, in 2014, GFI network has been attacked which resulted in losing customer’s confidence and USD 1.7 million as a penalty in lawsuit. Moreover, it has been noticed that GFI’s employee lost his laptop containing company’s confidential information. Each cyber-incident is due to company failure to put forth a good cybersecurity policy. In the recent incident of client losing a laptop containing financial details of customers. the hard disk of the laptop was not encrypted and it contained financial details of customers, client failed to encrypt the hard disk of his laptop. Due to several incidents of cyber-attacks on the company’s network, the Chief Operating Officer has asked for risk assessment report. The risk assessment report also identifies the vulnerabilities in company’s network infrastructure and the plan devised for securing and improving GFI’s network.
Proposal
Risk Assessment Report is used for identifying security threats within the company’s network. The effect of these threats along with the necessary steps needed for securing the company’s network is discussed in this report. Company’s |COO has commissioned a team to assess risk of security in company’s network infrastructure to determine whether there are vulnerabilities present in the company’s network. As per past incident of network breach, company might get bankrupt in case of another security breach. Qualitative and quantitative assessment approach will be used for assessing network vulnerabilities. The approach will also help in identifying the value of company’s asset. A qualitative assessment is based on no numerical levels and categories by setting up rules, principal, and methods. A quantitative assessment is based on data and numbers by setting up riles, principal, and methods CITATION SRC94 \l 1033 (SR Chaplan, 1994). In this Risk Assessment Report, assumptions are based on vulnerabilities, value of asset, and impact of network breach using qualitative and quantitative approach.
Asset Inventory and Priority
Organizations are unaware when the network breach is going to happen. It is the responsibility of the company’s IT department to conduct an analysis network security risks and find solution to overcome network vulnerabilities. Risk analysis allows a company to identify network security threats and devise a relevant network security policy. Risk analysis also provides a way of identifying the level of vulnerabilities and helps in designing a secure network. GFI is an international company that provides financial services to its clients in Mexico, Canada, and United States. As GFI is managing sensitive and financial data of thousands of consumers, its network needs to be secured. Due to recent incidents of cyber attacks, this report will evaluate the value of assets along with its priority. Table 1 explains the equipment worth along with its priority and its objective.
LINK Excel.Sheet.12 "C:\\Users\\Evening\\Desktop\\Masoud\\work\\MPW-106528\\Book1.xlsx" "Sheet1!R1C1:R17C6" \a \f 5 \h \* MERGEFORMAT
Sr. No.
Equipment
QTY
Asset Value
$
Priority
Object
1
Printers
26
53040
Low
Prints data
2
Workstation
171
726750
Moderate
Helps employee in doing daily tasks
3
Exchange e-mail server
1
7140
Low
the facility of email for the employees
4
Internal DNS server
1
7990
Moderate
for sharing resources
5
SUS server
1
8160
Moderate
Provide patch management to the servers, and also provides necessary updates to employees
6
Internet Web Server
1
10030
Moderate
Allows sharing files between departments
7
Oracle Database Server
1
9350
Very high
Transactions data center
8
Access Layer VLAN
6
8670
Low
For separating department on the bases of the subnet address
9
Multi-layers switch
3
35700
High
link routers, TCB network, and VLAN switches
10
Wireless Router
1
20400
High
Helps BYOD policy by allowing internet connection to employee's devices
11
Distribution Router
2
27030
Moderate
Allows traffic flow between WAN which includes PBX and access
12
Border Core Router
2
85000
Very high
Link company's network to the internet
13
VPN gateway
1
10200
Very High
allows secure communication between TCB network and remote location
14
RAS
1
3400
Low
allows users to connect to the network via VPN
15
PBX
1
850
Low
Authenticated dial-in connection for user
Table 1: Asset and Priority
In Table-1, the value of assets is compared with their level of priority on the basis of their impact on network security. The value of the Oracle Database server is set very high, this is because all the financial data and transaction store in Oracle Database Server. Oracle Database server is a valued part of GFI’s network infrastructure. A company can go bankrupt if the Oracle Database is compromised. Switches and Border Core Routers are also set at high priority as they allow the connection between devices. Devices are interconnected with the help of switches in a way that the system will not crash if one equipment malfunction. RAS server, PBX, and printers are set at low priority.
Network Topology Assessment
GFI network is connected to Wide Area Network (WAN) which is on a mesh topology. Shown in figure 1. In this kind of topology, a single router is connected to switches or other routers. Every router in the topology of the GFI network is connected to every other switch or every other router CITATION KZh02 \l 1033 (K Zhu, 2002).
GFI network offers excellent performance and it has 10 remote locations. Clients of the company are connected to their network using the internet connections present at their homes. Clients are granted access by the company to its Oracle database server which is installed in company’s headquarter.
The company’s database servers are not encrypted. The database server receives data from a remote access site. There is no encryption in the company’s database which is accessed by the clients. No encryption in the connection raises the risk of cyber-attacks.
Install Internet Protocol Security (IPSec) to the company’s network for its protection from potential hackers. IPSec contains three encrypted protocols that are used for the protection of company’s traffic and its database server CITATION AHo02 \l 1033 (A Householder, 2002).
With the advancement of technologies chances of network breaches also increase. Parameters that can make company’s network vulnerable to cyber-attacks are; internet of things, VPNs, remote access, cloud technologies, BYOD policies, and innovative smart technologies. GFI’s network requires an upgrade for protecting it against the vulnerabilities. The company’s network has two-border core router which is not enough for overall protection against cyber-attacks. In 2015, there has been an incident in which a unknown laptop had found connected to company’s network. A sniffer program was running on the laptop which was found in an empty office room in company’s head office. Security appliance method along with enabled port security can prevent any intrusion like 2015 incident.
Demilitarized Zone (DMZ) along with firewalls can be used for securing the company’s network from intrusions. A passive action to be aware of threats and their pattern is called alerts and logs. A company’s network should have a Firewall with a mechanism of automated active for providing protection and enable a user to respond to a threat. DMZ can be used for protecting company’s network perimeters and is installed between the security appliance and the router CITATION DPJ09 \l 1033 (DP Johnson, 2009). The topology of GFI’s network should be changed to Screened Subnet for added protection CITATION Zal02 \l 1033 (Zalenski, 2002). Empty ports within the company’s network should also be disabled.
Company has recently put forth a Bring Your Own Device (BYOD) policy which allows an employee to connect their personal devices to the company’s network. Although the BYOD policy gives flexibility to its employee, but increase the chances of potential cyber-attacks CITATION KWM12 \l 1033 (KW Miller, 2012). There is two external access point in GFI’s network; one is Private Branch Exchange (PBX) and the second one is VPN. The authentication process in the VPN connection contains user credentials and it utilizes Microsoft- Challenge Handshake Authentication Protocol (MS-CHAP) V2. In MS-CHAP, every device in the company’s network has to authenticate other devices CITATION SNo06 \l 1033 (S Norman, 2006). For added protection, two pathways are installed within the company’s network for separate encryption key for each command while going through a specific part of the network. For VPN remote access, an IPsec protocol should be installed in the network for the protection of network traffic. Recommended steps will eventually protect the company’s database servers from intruders.
Internet of things (IoT) is a concept that allows devices to connect to a bigger network. GFI is an example of BYOD and IoT as the company allows its employees and consumers to have remote access to their servers. For a company’s wireless connection, our company uses the WEP protocol. A network with WEP protocol uses static security keys which is the biggest flaw of company’s network. To overcome the issue, IEEE 802.1X security protocol should be used within the company’s network. Company has Wide Area Network (WAN) with several access point which raises the chances of getting cyber-attacks.
Network Authentication
The company’s network depends on remote access, mobile devices, wireless connection, and wired connection. To reduce the chances of vulnerabilities in network infrastructure, proper authentication protocols are needed. To protect company’s wireless network, IEEE 802.1X protocols should be implemented. IEEE 802.1X protocol enables control over access points. Moreover, IEEE 802.1X also provides methodology to distribute encryption keys within the company’s network CITATION JCC05 \l 1033 (JC Chen, 2005). WEP protocol that a company is already using only provides system based authentication. An Organization like GFI, which is practicing BYOD policy and using IoT strategy requires a user-based authentication. Company’s employee has option of using mobile devices, laptop, or a tablet. The devices are all company’s asset which is provided to its employees for better performance. In addition, employee has an option of BYOD which further increases the performance of company’s operations. The vulnerabilities of the network increase with the BYOD policy. There are mobile software management solutions available, which reduces the chances of security threat. Mobile Device Management (MDM) which is a network-based solution is needed for protecting company’s asset. The company’s administration can remotely upgrade its security policy by using MDM solution. In addition, a stolen or misplaced device can be wiped away and removed from the company’s network with the help of MDM solution. MDM solution will reduce the vulnerabilities in remote access point, mobile devices, and company’s internal WAN CITATION JFr04 \l 1033 (J Fraley, 2004). A port-based solution using IEEE 802.1protocal is also needed for added protection. Unlike the incident of 2015, it will be hard for any hacker to connect its device to company’s network with proper authentication.
Risk Assessment
The business sway evaluation (BIA) process approaches the issue from both quantitative and subjective perspectives. Be that as it may, it is enticing for a Business congruity arranging (BCP) group to "go with the numbers" and play out a quantitative evaluation while ignoring the to some degree progressively troublesome subjective appraisal. It is essential that the BCP group play out a subjective examination of the elements influencing the BCP procedure (Stewart, Chapple, and Gibson, 2012). The hazard evaluation recognizes the advantage with the opportunity it may happen and the effect it has on the system. Stewart et al., when a BCP has finished the following stage in the BIA is to recognize the assets that are basic to an association's continuous reasonability and the dangers presented to those assets. It additionally surveys the probability that every risk will happen and the effect those events will have on the business
A fundamental bit of the procedure inside the BCP is the Quantitative and Qualitative examination in which both are similarly significant. When getting to the presumable hood that an episode may happen the measurements use to decide the single misfortune anticipation (SLE) which is an event likely occur, we can figure the fiscal misfortune with the equation SLE = Asset Value (NAV) x Exposure Factor (EF). For instance, how about we inspect the GFI arrange edge the AV is the outskirts center switch/Oracle DB evaluated all out worth is $55,500. The EF is evaluated at 95%, and this was resolved to utilize the measurement of the past risk to the system beginning in 2013 and finishing in 2015. In each example, a programmer had the option to penetrate into the system accessed the Oracle database. The single misfortune hope ascertains with the equation above is $52,725 if this event is probably going to occur
Vulnerabilities
Distributed computing has been one of the most problematic advances, which has changed the way undertakings, both little and huge expend IT. The capacity to buy into the "as-an administration" utilization model, while changing over capital consumption to operational use, has been a key driver for Cloud reception (Chen, Zhang, and Gottschalk, 2017). GFI is pushing ahead in building up an arrangement to offer its item and administrations online by means of the Cloud. The COO has communicated his worry over the security highlight inside the distributed computing condition.
Distributed computing gives favorable circumstances over the utilization of a supercomputer lodging GFI database. There are numerous arrangements inside the distributed computing condition to convey administration to the cloud. In the first place, before any administration builds up a cloud base condition must be tried first to improve the IT foundation necessities, there are various alternatives for distributed computing to incorporate inward/outside to private stockpiling/open stockpiling. For GFI cloud structure we will take a gander at using interior stockpiling and moving some advantage for the cloud. cloud condition would befit the structure for GFI to used private stockpiling resources; furthermore, the security concern the COO has about security if there should be an occurrence of break of organization information. GFI should set up a virtualization situation to test the distributed computing condition before provisioning the administrations. The test condition ought to be arranged on servers dwelling inside TCB. This choice uses the current equipment right now set up along these lines sparing the organization on buying costly equipment and programming related support cost. GFI Intranet Web Server dwells with the Trusted Computing Based Internal Network. (TCB) which is a connect to a multilayer switch, the VPN Gateway, and Border Core Router. The outskirt center switch, by and large, handles the edge protection, the fringe switch will do it occupation of separating of inbound traffic yet came up short on the security include prerequisites of a security apparatus, anyway with the uptick of system traffic a security mechanism is a favored technique to verify the GFI organize edge from undesirable interruptions
Remote Configuration Management
Procedure of keeping up and sorting out data of the considerable number of parts of organization's system is called remote design the executives. System the executive database causes the organization to overhaul, alter, grow, and fix organization's system remotely. The information base has system address, IP address, and area of equipment gadgets (Perkins, 1992). Besides, data about updates, forms, projects and setting of equipment gadgets which are introduced inside the system foundation of the organization. Remembering over, the organization can utilize remote system directors in its system framework to expand efficiency of the framework. Any disappointment in the system can likewise be observed effectively utilizing remote system setup. As there is an alternate arrangement for each system gadget, organize design can facilitate the way toward sparing various setups. To fix a specific equipment or programming disappointment inside the system, remote system design administrator can spare time and exertion. The information is generally put away in focal servers with the end goal of remote arrangement supervisor. There are numerous instruments accessible for the remote system design the board, seller explicit apparatus will be progressively appropriate for our organization's system. In remote design the executives, framework organization can be utilized to decrease personal time of a system. In addition, the responsibility and deceivability of system additionally improve with remote arrangement the executives. Following are the advantages our organization can accomplish by introducing remote system arrangement:
a.Easily documenting of subtleties in system setup changes.
b.If the framework refreshing makes framework shutdown, it can without much of a stretch be downsized to past settings and programming.
c.Changes made in one equipment does not influence other gadget.
d.Network security will be advanced.
e.Configuration and change the board for the most part causes mistake; this can be decreased by utilizing remote design the executives.
f.Systematic procedure of updating, extension, fix, and upkeep in the system
It is seen that there is an obscure gadget associated with the organization's system. This can be identified by either by Sequence number examination or from Dynamic Host Configuration Protocol (DHCP) customer tables. On the off chance that any obscure gadget's IP address or MAC address is identified in the DHCP table, MAC address of the gadget can be effectively obstructed by essentially utilizing passage design. Advance system verifying apparatuses which are proposed before can likewise be utilized for this reason. When the MAC address is obstructed, the gadget will never again appear in DHCP customer table. This will guarantee that the client or the gadget has been totally expelled from the system. Moreover, IP output of the system will likewise demonstrate the rundown of the IP delivers associated with the system. On the off chance that the fixed IP delivers are relegated to every gadget and its data is store arrangement database, an obscure IP address will be effectively recognized. Remote arrangement the executives can be utilized to acquire the MAC address of that IP client. When the MAC address is gotten, it can likewise be blocked utilizing remote setup the executives.
Analyze Wireless Traffic
The last advance CIR is to break down the traffic of the remote system. Pre-caught records of remote traffic from organization's system are given to investigate the system. These pre-caught documents can be utilized to screen representative exercises. By contrasting pre-caught records and the present traffic will distinguish and suspicious or noxious conduct. Breaking down traffic of the system. The fundamental motivation behind dissecting remote traffic is to guarantee that information is verified and no gatecrasher is invading through organization's traffic. The best approach to screen remote traffic is to utilize arrange design the board and validated access. This will guarantee dependable checking of the traffic and will verify information transmission. Verification gets to likewise enables the organization to keep record of the logins and addresses of the gadgets which are associated with the organization's system. Including secure logins will further improve the security of the system. Most organizations scramble their information before moving between various gadgets which guarantee the security of remote traffic. Virtual Private Network (VPN) and point to point encryption are utilized filling the need masking the traffic from the assailant. The last wilderness of verifying a remote system and its traffic is' organization. An organization needs to keep up the security of the system by making different strides after the establishment of secure remote system (Bauer, 2004). The means incorporate customary checking of the entrance logs and standard observing of the system traffic. Standard checking can help in recognizing any deficiency in framework, arrange entrance, information rupture, undesirable access logs, and MAC parodying. Additionally, cautious observing can likewise help in recognizing who is disregarding the organization's system approach. To introduce a smart traffic checking framework in the organization's system, thee various segments must be introduced. The first part is the observing unit which screens the traffic at various focuses inside the system. The next part in smart checking framework is the putting away unit. An organization's stockpiling servers can be utilized to store traffic logs. The most significant piece of the observing framework is to introduce a keen anticipating unit. This determining will help in recognizing danger or flaw inside the framework and will likewise upgrade the exhibition of the framework. Gauging unit has total access to the put-away logs, it can foresee that what can turn out badly or what sort of interest is required at explicit time. Introducing this sort of keen framework will require endeavors and time. There are numerous merchants who are giving such a clever observing arrangement which can be over the top expensive.
Conclusion
Perimeters Security was assessed. The network perimeter implementation lapsed and failed to protect the perimeter security within the network of GFI. The internal network is protected by the two border router. This helps the border router filter and contain the incoming traffic, it also highlights the vulnerabilities within the security measures that are applied. Moreover, the recommended method to secure the network traffic security is to use a security appliance to secure the GFI network perimeters from irregular intrusions. In addition to this activating port, security would have protected and secured the unauthorized machine attached to the network.
The company liberates the employees to their own devices such as laptops, smartphones, and tablets. This reduces the cost of IT devices. Implementing the BYOD policy has its own risks, the GFI networks cannot secure them. To manage such risks, company’s management should introduce applications such as VMware Air Watch to contain the threats related to BYOD. The application is an intelligence-based app, that secures digital workspace platforms. It securely delivers and manages any app on any device by unifying the access to control, and multi-platform endpoint management.
To further protect the network, Remote access is used to access the area. Remotes access undertakes the dial-up system, which is a conventional threat protection system, not used anymore. It is recommended that the traditional remote access system shall not be used anymore and the CVPN should be actively applied to secure the network. Removing the remote access dial system will not add to the GFI system. In order to comprehend and full establish a VPN remote access L2TP/IP sec protocol must be applied. This will enable protection to data in case of connection from remote to the GFOI network. Applying and effectively establishing this would reduce and limit the intrusion in the GFI financial data stored in the server Oracle DB. This system will also require a DMZ and Firewall.
Two security measures are further required to keep the GFI network safe. These two security appliances could be the firewall and the DMZ, which may stop the incoming traffic from intruding within the existing system. The alerts and the logs may be useful in informing, detecting and investigating timely threats, but these devices cannot provide active threat protection. The essential requirements for the security mechanisms are to provide active and passive protection against intrusions. The Firewalls only provide automatize response against the active threats. This security mechanism filters the traffic and limits the irregular and unwanted traffic in the network (see fig. 2). The costs of the two-security appliance are estimated at $13700.
Cloud computing will address the implementation of cloud services using a testing environment with a virtual environment, this identifies areas where security vulnerabilities persist. The organization may use a cloud design that is utilizing internal storage and moving some data on the cloud and hence securing it through it. This secures data and optimizes the intrusion through control mechanisms.
Another way to secure the network is to enhance and effectively the wireless security protocol. Wired Equivalent Privacy is a pioneer in protecting wireless access security. The WEP is not a popularly recommended method to secure a GFI network. The IEEE standard 802.1X or user-centric security is powered by the GFI wireless authentication system. The IEEE 802.1 is not a standard wireless protocol it can only be implemented with both a wireless and wired network. The technology issues authentication framework and ways to distribute keys of encryption. The WEP works with the WPA2 that assigns a static key and gives a system authentication.
The web access protocol such as the DMZ and the Firewall specifically designed to protect Global Finance Incorporation internal networks from incoming threats and viruses
Executive Summary
The motivation behind this paper is to give Security Assessment report to significant media and diversion organization. The organization has started a Bring Your Own Device (BYOD) strategy which results in numerous security episodes. The BYOD strategy of the organization has expanded the helplessness of the organization's system framework. This paper will likewise give the suggestion and new security arrangement which will guarantee the general wellbeing of the organization's system. Utilizing a rule by National Institute of Standard and Technology (NIST) for verifying a Wide Area Network is utilized for structuring remote and BYOD security plan. In remote and BYOD security plan, the standard design of every part of the organization's WLAN system will be utilized. Notwithstanding institutionalized setup, the digital executes chain structure is broke down while planning the system security plan for the organization. Next, a component is intended to follow the area of the organization's benefits. Layered security will be introduced in the organization's system framework to hinder the aggressor's entrance. Macintosh ridiculing is a major risk as it is utilized by most person who needs to harm the organization. Arrangement number examination can be utilized to recognize MAC parodying or data fraud. The arrangement number field of 802.11 casing header has a number field of 12 bits (Hegde, 2016).
The organization has a choice of introducing both wired and remote system, both have their advantages and disadvantages. A remote system gives simplicity of portability and gives similarity the most recent gadgets. A wired association has no remote passage, it hard for an interloper to infiltrate the framework. The organization's remote system can be effectively arranged to shared keys utilizing the WPA PSK convention which offers 256 characters created key for the passageways. The organization's system framework can be effectively made FIPS-1040-2 consistent, by utilizing the WPA2 security convention. The organization's remote traffic will be checked by presenting astute observing of the framework. smart checking will guarantee the general wellbeing of the organization's remote system. The test with redistributing the corporate system security to outside organizations to deal with the IT framework ought not be standard practice to redirect cost investment funds in the long haul re-appropriating could conceivably accomplish more damage than shielding the system from outside interruption. This examination finishes up the vulnerabilities distinguish in this evaluation can be relieved by the IT staff. A business progression plan is fundamental in case of an absolute blackout of system benefits, a border resistance to ensure the system is required, by actualizing a screened subnet firewall topology will improve security, expelling dial-up administration ought to be the standard practice since utilizing dial-up is an obsolete innovation. In the present processing condition executing distributed computing ought to be the standard and not the exemption of utilizing this innovation will decrease the IT framework support and redesign expenses
.
References
BIBLIOGRAPHY A Householder, K. H. (2002). Computer attack trends challenge Internet security. IEEE Journal. Retrieved from https://ieeexplore.ieee.org/abstract/document/1012422
B Cashell, W. J. (2004). The economic impact of cyber-attacks. CRS. Retrieved from http://archive.nyu.edu/bitstream/2451/14999/2/Infosec_ISR_Congress.pdf
Bauer, B. (2004). Network traffic monitoring. Google Patent. Retrieved from https://patents.google.com/patent/US20040047356A1/en
Dhawan, S. (2007). Analogy of promising wireless technologies on different frequencies: Bluetooth, wifi, and wimax. IEEE.
DP Johnson, D. R. (2009). Method and system for creating a demilitarized zone using network stack instances. Google Patentes. Retrieved from https://patents.google.com/patent/US7633864B2/en
Hegde, A. (2016, January 1). MAC Spoofing Detection and Prevention. International Journal of Advanced Research in Computer and Communication Engineering, 5(1), 230,231. Retrieved from https://ijarcce.com/wp-content/uploads/2016/02/IJARCCE-55.pdf
J Fraley, N. C. (2004). Mobile device management system. Google Patents. Retrieved from https://patents.google.com/patent/US20040252197A1/en
JC Chen, Y. W. (2005). Extensible authentication protocol (EAP) and IEEE 802.1 x: tutorial and empirical experience. IEEE communications magazine. Retrieved from https://ieeexplore.ieee.org/abstract/document/1561920/
K Zhu, B. M. (2002). Traffic grooming in an optical WDM mesh network. IEEE Journal. Retrieved from https://ieeexplore.ieee.org/abstract/document/974667
KW Miller, J. V. (2012). BYOD: Security and privacy considerations. It Professional. Retrieved from https://ieeexplore.ieee.org/abstract/document/6320585
Perkins, C. (1992). Network address management for a wired network supporting wireless communication to a plurality of mobile users. Google Patents.
S Norman, D. H. (2006). System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol. Google Patents. Retrieved from https://patents.google.com/patent/US7082535B1/en
SR Chaplan, F. B. (1994). Quantitative assessment of tactile allodynia in the rat paw. Journal of neuroscience. Retrieved from https://www.sciencedirect.com/science/article/pii/0165027094901449
Zalenski, R. (2002). Firewall technologies. IEEE potentials. Retrieved from https://ieeexplore.ieee.org/abstract/document/985324/
More Subjects
Join our mailing list
© All Rights Reserved 2024