Chat with us, powered by LiveChat For this Assignment, you will act as a consultant hired by a small organization to develop a presentation on supporting business continuity while considering ethics, privacy c - Writingforyou

For this Assignment, you will act as a consultant hired by a small organization to develop a presentation on supporting business continuity while considering ethics, privacy c

 

For this Assignment, you will act as a consultant hired by a small organization to develop a presentation on supporting business continuity while considering ethics, privacy concerns, and security risks. The organization requested that you base your presentation on a particular case that they have identified. This case is based on a real-world situation where the electronic voting system used by the Public Opinion Programme (POP) at the University of Hong Kong was under serious distributed denial of service (DDoS) attacks. In this series of case studies (A and B), you will be given the opportunity to practice identifying and assessing potential cybersecurity risks and choose risk control strategies for business continuity and disaster recovery.

This case study consists of cases A and B. Case A gives the background on POP and PopVote and allows you to explore how to identify and assess potential security risks. Case B sets the scene for risk control in information security management. It describes some unexpected situations where management will need to make immediate decisions on what they should do to control the risks.

For this week, you will prepare a 6- to 8-slide presentation (excluding title slide and reference slide). You will submit Part 1 this week and Part 2 in Week 6. In addition to the slide content, you should also include text in the speaker notes section of each slide that would serve as the script you would use to deliver this presentation to a group of people. Your speaker notes should include your rationale and assumptions that pertain to your slide. You also need to have a minimum of 3–4 citations and references to support your direction. Note: You may elect to include additional slides as part of an appendix if you have information you might reasonably assume that a CEO or upper management might want. It is not required that you do so.

To prepare for this Assignment:

 

BY DAY 7

Submit Part 1 of your presentation and script. Be sure you are fully addressing the following in 5–6 slides, excluding references:

Part 1: Identify and Evaluate Cybersecurity Risks

  • Rank the vulnerabilities of PopVote, the electronic voting system, in terms of impact (financial or otherwise) to the organization. (In your speaker notes, be sure to provide rationale for your rankings.) (1–2 slides)
  • Identify what the Public Opinion Programme (POP) did to mitigate risks before the New Year vote in 2014. (2 slides)
  • Evaluate the strengths and weaknesses of POP’s risk mitigation plan before the New Year vote in 2014. (2 slides)

Refer to the Week 5 Assignment Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.

HBP Product ID: ST32B

UST032/B/1608

KAI LUNG HUI MINYI HUANG PING FAN KE ANTHONY LAI

PopVote: Assessing the Risks of DDoS (B)

The DDoS attack on PopVote in 2012 caused serious problems for the Public Opinion Programme (POP) at the University of Hong Kong. To ensure possible future attacks would not cripple POP in a similar manner, POP established an IT Advisory Group and spent half a year improving the system. It changed the programming language to improve scalability, implemented more data security and safety measures, moved the system to a cloud service provider to improve network traffic management, and used modular designs to strengthen system usage. As a result, the New Year Vote 20141 ran smoothly, with some delays only during the SMS verification process.

The scale of the New Year Vote 2014 was relatively small, so the real test of the system was the voting event in June of the same year. The event sponsor, Occupy Central, and the vote were politically controversial.2 Moreover, the sponsor intended to use the voting event to attract the attention of the public in order to measure the support for its political campaign.3 Because the vote was presented as a high-profile event, Robert Chung, director of POP, and Jazz Ma, IT manager, were expecting massive cyber-attacks. After the New Year Vote 2014, they worked with the IT Advisory Group closely. They assessed all possible threats and took a series of additional security measures. They thought they were well prepared for cyber-attacks. But what happened during the mock vote was beyond everyone’s expectations.

Security Improvements

To improve cloud-based security, POP outsourced the system to three well-known international and local companies, Amazon Web Services (AWS), CloudFlare, and UDomain. UDomain provided cloud-based

1 The voting event was named by the event organizers “New Year Civil Referendum.” 2 M. Yan, “June 22 poll is a political fraud by ‘Occupy’ heads,” China Daily Asia, June 6, 2014,

http://www.chinadailyasia.com/opinion/2014-06/06/content_15138863.html, accessed 8 September 2014. 3 “Hong Kong votes in unofficial democracy referendum,” BBC News, June 20, 2014, http://www.bbc.com/news/world-asia-

china-27936340, accessed 8 September 2014.

Dr Minyi Huang, Ping-fan Ke and Anthony Lai prepared this case under the supervision of Professor Kai-lung Hui solely as a basis for class discussion. The authors may have disguised certain data to protect confidentiality. Cases are written in the past tense; this is not meant to imply that all practices, organizations, people, places or facts mentioned in the case no longer occur, exist, or apply. Cases are not intended to serve as endorsements, sources of primary data, or illustration of effective or ineffective handling of a business situation.

Inquiry on ordering and permission to reproduce the case and its materials, write to [email protected] or visit cbcs.ust.hk

© 2015 by The Hong Kong University of Science and Technology. This publication shall not be digitized, photocopied or otherwise reproduced, posted, or transmitted without the permission of the Hong Kong University of Science and Technology.

Last edited: 16 August 2016

This document is authorized for use only by Yaina Delgado in Managing Business Info Syst-Spring 2024 at Walden University (Canvas), 2024.

HKUST Business School Thompson Center for Business Case Studies

protection service, whereas CloudFlare supplied domain name server (DNS) hosting services and Amazon provided cloud hosting via its EC2 and content delivery network (CDN) service via CloudFront [see Glossary for a definition of terms].

A mock vote was carried out between 12:00 on 13 June and 21:00 on 18 June to familiarize the public with the voting process, before the actual vote took place between 20 and 22 June (hereafter the 22 June vote4). Different from the previous vote, this mock vote was intended to be a preregistration for the 22 June vote. During the mock vote period, voters could download the e-voting platform to their mobiles, register using their HKID and mobile numbers, and send SMS to the system for verification. Once registered and verified for the mock vote, they could use the same personal details to skip the SMS verification process for the 22 June vote and directly participate in the voting. The preregistration and mock voting were only for voting using mobile applications and did not apply to the website voting platform. During the whole voting period, the e-voting platform allowed access only from local (HK) networks for security reasons.

PopVote negotiated with the SMS service provider to enhance the SMS scheme for the June vote. The number of people allowed by the system was increased, and a reminder was added to the end of the verification process to tell voters that they would be automatically directed to the voting interface.

Mock Vote

The mock vote started at noon on 13 June. The system worked very well for the first 30 hours and received over 20,000 successful registrations, without any network or SMS problems.5 Then, the DDoS attacks started:

 The DDoS attacks on the DNS service provider, CloudFlare, started on 14 June [see EXHIBIT 1 for the DDoS attack map on 14 June]. On the same day, CloudFlare added a rate limit to popvote.hk to limit the amount of traffic and control the network congestion.6 AWS Route 53 was added as another DNS service provider.7

 On 15 June, the DNS of AWS recorded over 10 billion system requests in 20 hours.8

 Between 15 and 16 June, the DDoS attack to CloudFlare reached the scale of 75 gigabytes (gb) per second at peak.9

 During the same period, the peak DDoS attack to UDomain was 10 gb per second, which had consumed most of UDomain’s Internet bandwidth. 10

 By June 16, the DNS of AWS had already recorded over 100 billion system requests11 [see EXHIBIT 2 for DDoS attack map on 16 June].

On the afternoon of 16 June, after suffering continuous DDoS attacks for about 20 hours on a scale that had been rarely seen, AWS and UDomain took an unusual step and decided to suspend services provided

4 This voting event was named by the event organizers “6.22 Civil Referendum.” 5 HKU POP, “Mock Voting System of ‘6.22 Civil Referendum’ under Severe Attack,” June 16, 2014,

http://hkupop.hku.hk/english/release/release1149.html, accessed 8 September 2014. 6 Unlike the voting system, which allowed only Hong Kong IPs to access, the DNS name server could be accessed from

outside Hong Kong. By attacking the DNS server, one could block access to popvote.hk and its subdomains. 7 Jazz Ma, “POP Vote Technical Sharing Seminar,” Hong Kong Polytechnic University, Hong Kong, 22 September 2014. 8 HKU POP, “Mock Voting System of ‘6.22 Civil Referendum’ under Severe Attack.” 9 Ibid. 10 Ibid. 11 Ma, “POP Vote Technical Sharing Seminar.”

ST32B UST032/B/1608 PopVote: Assessing the Risks of DDoS (B)

2

This document is authorized for use only by Yaina Delgado in Managing Business Info Syst-Spring 2024 at Walden University (Canvas), 2024.

HKUST Business School Thompson Center for Business Case Studies

to PopVote. AWS stopped providing DNS services, while UDomain ended its web application firewall services and only redirected the traffic without inspection. CloudFlare became the only organization to continue service. As a rate limit was set on 14 June, CloudFlare allowed only a limited number of requests per time slot to reach its DNS server. As a result, the mobile application platform for mock voting and preregistration provided only partial services on 15 and 16 June, because those requests exceeding the rate limit, no matter whether legitimate or not, were unable to reach the e-voting platform.

What Next?

The sudden withdrawal of services by AWS and UDomain was a shock to Robert Chung and Jazz Ma. CloudFlare, the only remaining service provider, also warned them that preregistration and mock voting might stop because the next round of enormous cyber-attacks could take place any time. Facing the risks of system suspension, they had to come up with emergency plans quickly. What could they do?

ST32B UST032/B/1608 PopVote: Assessing the Risks of DDoS (B)

3

This document is authorized for use only by Yaina Delgado in Managing Business Info Syst-Spring 2024 at Walden University (Canvas), 2024.

HKUST Business School Thompson Center for Business Case Studies

EXHIBIT 1: DDOS ATTACK MAP (14 JUNE 2014)

Sources: Adopted from website of Digital Attack Map, www.digitalattackmap.com/#anim=1&color=0&country=HK&list=0&time=16234&view=map.

ST32B UST032/B/1608 PopVote: Assessing the Risks of DDoS (B)

4

This document is authorized for use only by Yaina Delgado in Managing Business Info Syst-Spring 2024 at Walden University (Canvas), 2024.

HKUST Business School Thompson Center for Business Case Studies

EXHIBIT 2: DDOS ATTACK MAP (16 JUNE 2014)

Sources: Adopted from website of Digital Attack Map, www.digitalattackmap.com/#anim=1&color=0&country=HK&list=0&time=16236&view=map.

ST32B UST032/B/1608 PopVote: Assessing the Risks of DDoS (B)

5

This document is authorized for use only by Yaina Delgado in Managing Business Info Syst-Spring 2024 at Walden University (Canvas), 2024.

HKUST Business School Thompson Center for Business Case Studies

GLOSSARY

CDN (Content Delivery Network)

A content delivery network, also known as a CDN, is an interconnected network of servers placed around the globe for faster web content delivery. Entire websites, or parts of it, can be cached (duplicated) on each of the servers that are located close to the end user. Reducing the distance between the end user and server reduces the time that is required to deliver data across the web. The process greatly reduces load time and enhances reliability.

DNS (Domain Name System)

A DNS is an Internet system that translates domain name URLs (like cdnetworks.com) into Internet Protocol (IP) addresses, or a number identifying the location of a site, where it is from, and where it is going. A DNS is essentially a type of GPS used to navigate the map of the Internet.

Firewall12

A device that selectively discriminates against information flowing into or out of the organization.

Sources: Unless otherwise specified, the definitions are adopted from CDNetworks, “Web Performance Glossary,” 2015, www.cdnetworks.com/company/web-performance-glossary, accessed 29 January 2015.

12 M. E. Whitman and H. J. Mattord, Principles of Information Security, 4th ed. (Singapore: Course Technology, 2012), p. 589.

ST32B UST032/B/1608 PopVote: Assessing the Risks of DDoS (B)

6

This document is authorized for use only by Yaina Delgado in Managing Business Info Syst-Spring 2024 at Walden University (Canvas), 2024.

<< /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /None /Binding /Left /CalGrayProfile (Gray Gamma 2.2) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated 50SWOP51 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Error /CompatibilityLevel 1.4 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.0000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails true /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize true /OPM 1 /ParseDSCComments true /ParseDSCCommentsForDocInfo true /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo true /PreserveFlatness true /PreserveHalftoneInfo false /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts false /TransferFunctionInfo /Apply /UCRandBGInfo /Remove /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 150 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages false /ColorImageDownsampleType /Bicubic /ColorImageResolution 600 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages false /ColorImageFilter /DCTEncode /AutoFilterColorImages true /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /ColorImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 150 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages false /GrayImageDownsampleType /Bicubic /GrayImageResolution 600 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages false /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /GrayImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 1200 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages false /MonoImageDownsampleType /Bicubic /MonoImageResolution 600 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages false /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName () /PDFXTrapped /False /CreateJDFFile false /Description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f7f75288fd94e9b8bbe5b9a521b5efa7684002000410064006f006200650020005000440046002065876863900275284e8e55464e1a65876863768467e5770b548c62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200036002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002> /CHT <FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef69069752865bc666e901a554652d965874ef6768467e5770b548c52175370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200036002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002> /CZE <FEFF0054006f0074006f0020006e006100730074006100760065006e00ed00200070006f0075017e0069006a007400650020006b0020007600790074007600e101590065006e00ed00200064006f006b0075006d0065006e0074016f002000410064006f006200650020005000440046002000760068006f0064006e00fd006300680020006b0065002000730070006f006c00650068006c0069007600e9006d0075002000700072006f0068006c00ed017e0065006e00ed002000610020007400690073006b00750020006f006200630068006f0064006e00ed0063006800200064006f006b0075006d0065006e0074016f002e002000200056007900740076006f01590065006e00e900200064006f006b0075006d0065006e0074007900200050004400460020006c007a00650020006f007400650076015900ed007400200076002000610070006c0069006b0061006300ed006300680020004100630072006f006200610074002000610020004100630072006f006200610074002000520065006100640065007200200036002e0030002000610020006e006f0076011b006a016100ed00630068002e> /DAN <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> /DEU <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> /ESP <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> /ETI <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> /FRA <FEFF005500740069006c006900730065007a00200063006500730020006f007000740069006f006e00730020006100660069006e00200064006500200063007200e900650072002000640065007300200064006f00630075006d0065006e00740073002000410064006f006200650020005000440046002000700072006f00660065007300730069006f006e006e0065006c007300200066006900610062006c0065007300200070006f007500720020006c0061002000760069007300750061006c00690073006100740069006f006e0020006500740020006c00270069006d007000720065007300730069006f006e002e0020004c0065007300200064006f00630075006d0065006e00740073002000500044004600200063007200e900e90073002000700065007500760065006e0074002000ea0074007200650020006f007500760065007200740073002000640061006e00730020004100630072006f006200610074002c002000610069006e00730069002000710075002700410064006f00620065002000520065006100640065007200200036002e0030002000650074002000760065007200730069006f006e007300200075006c007400e90072006900650075007200650073002e> /GRE <FEFF03A703C103B703C303B903BC03BF03C003BF03B903AE03C303C403B5002003B103C503C403AD03C2002003C403B903C2002003C103C503B803BC03AF03C303B503B903C2002003B303B903B1002003BD03B1002003B403B703BC03B903BF03C503C103B303AE03C303B503C403B5002003AD03B303B303C103B103C603B1002000410064006F006200650020005000440046002003BA03B103C403AC03BB03BB03B703BB03B1002003B303B903B1002003B103BE03B903CC03C003B903C303C403B7002003C003C103BF03B203BF03BB03AE002003BA03B103B9002003B503BA03C403CD03C003C903C303B7002003B503C003B103B303B303B503BB03BC03B103C403B903BA03CE03BD002003B503B303B303C103AC03C603C903BD002E0020002003A403B1002003AD03B303B303C103B103C603B10020005000440046002003C003BF03C5002003B803B1002003B403B703BC03B903BF03C503C103B303B703B803BF03CD03BD002003B103BD03BF03AF03B303BF03C503BD002003BC03B50020004100630072006F006200610074002003BA03B103B9002000410064006F00620065002000520065006100640065007200200036002E0030002003BA03B103B9002003BD03B503CC03C403B503C103B503C2002003B503BA03B403CC03C303B503B903C2002E> /HEB <FEFF05D405E905EA05DE05E905D5002005D105E705D105D905E205D505EA002005D005DC05D4002005DB05D305D9002005DC05D905E605D505E8002005DE05E105DE05DB05D9002000410064006F006200650020005000440046002005D405DE05EA05D005D905DE05D905DD002005DC05EA05E605D505D205D4002005D505DC05D405D305E405E105D4002005D005DE05D905E005D505EA002005E905DC002005DE05E105DE05DB05D905DD002005E205E105E705D905D905DD002E0020002005E005D905EA05DF002005DC05E405EA05D505D7002005E705D505D105E605D90020005000440046002005D1002D0020004100630072006F006200610074002005D505D1002D002000410064006F006200650020005200650061006400650072002005DE05D205E805E105D400200036002E0030002005D505DE05E205DC05D4002E> /HRV <FEFF004F0076006500200070006F0073007400610076006B00650020006B006F00720069007300740069007400650020006B0061006B006F0020006200690073007400650020007300740076006F00720069006C0069002000410064006F00620065002000500044004600200064006F006B0075006D0065006E007400650020006B006F006A00690020007300750020007000720069006B006C00610064006E00690020007A006100200070006F0075007A00640061006E00200070007200650067006C006500640020006900200069007300700069007300200070006F0073006C006F0076006E0069006800200064006F006B0075006D0065006E006100740061002E0020005300740076006F00720065006E0069002000500044004600200064006F006B0075006D0065006E007400690020006D006F006700750020007300650020006F00740076006F007200690074006900200075002000700072006F006700720061006D0069006D00610020004100630072006F00620061007400200069002000410064006F00620065002000520065006100640065007200200036002E0030002000690020006E006F00760069006A0069006D0020007600650072007A0069006A0061006D0061002E> /HUN <FEFF0045007a0065006b006b0065006c0020006100200062006500e1006c006c00ed007400e10073006f006b006b0061006c002000fc007a006c00650074006900200064006f006b0075006d0065006e00740075006d006f006b0020006d00650067006200ed007a00680061007400f30020006d00650067006a0065006c0065006e00ed007400e9007300e900720065002000e900730020006e0079006f006d00740061007400e1007300e10072006100200061006c006b0061006c006d00610073002000410064006f006200650020005000440046002d0064006f006b0075006d0065006e00740075006d006f006b006100740020006b00e90073007a00ed0074006800650074002e002000200041007a002000ed006700790020006c00e90074007200650068006f007a006f007400740020005000440046002d0064006f006b0075006d0065006e00740075006d006f006b00200061007a0020004100630072006f006200610074002000e9007300200061007a002000410064006f00620065002000520065006100640065007200200036002c0030002d0073002000e900730020006b00e9007301510062006200690020007600650072007a006900f3006900760061006c0020006e00790069007400680061007400f3006b0020006d00650067002e> /ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF adatti per visualizzare e stampare documenti aziendali in modo affidabile. I documenti PDF creati possono essere aperti con Acrobat e Adobe Reader 6.0 e versioni successive.) /JPN <FEFF30d330b830cd30b9658766f8306e8868793a304a3088307353705237306b90693057305f002000410064006f0062006500200050004400460020658766f8306e4f5c6210306b4f7f75283057307e305930023053306e8a2d5b9a30674f5c62103055308c305f0020005000440046002030d530a130a430eb306f3001004100630072006f0062006100740020304a30883073002000410064006f00620065002000520065006100640065007200200036002e003000204ee5964d3067958b304f30533068304c3067304d307e305930023053306e8a2d5b9a3067306f30d530a930f330c8306e57cb30818fbc307f3092884c3044307e30593002> /KOR <FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020be44c988b2c8c2a40020bb38c11cb97c0020c548c815c801c73cb85c0020bcf4ace00020c778c1c4d558b2940020b3700020ac00c7a50020c801d569d55c002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200036002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e> /LTH <FEFF004e006100750064006f006b0069007400650020016100690075006f007300200070006100720061006d006500740072007500730020006e006f0072011700640061006d0069002000730075006b0075007200740069002000410064006f00620065002000500044004600200064006f006b0075006d0065006e007400750073002c002000740069006e006b0061