Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales
In the article, the characteristics of cobots are identified which allow the development of collaborative work with humans, causing industrial processes to be carried out with efficiency, high quality standards, opportunity and cost reduction. On the other hand, vulnerabilities that impact cobots wi...
- Autores:
-
Benavides Vallejo, Hector Ancizar
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2020
- Institución:
- Universidad Antonio Nariño
- Repositorio:
- Repositorio UAN
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.uan.edu.co:123456789/1702
- Acceso en línea:
- http://repositorio.uan.edu.co/handle/123456789/1702
- Palabra clave:
- Cobots
Auditoría de sistemas
Controles
Fraudes
Malas prácticas
Cobots
Systems Audit
Controls
Fraud
Bad practices
- Rights
- openAccess
- License
- Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
id |
UAntonioN2_c5ecb36f542c8c6f3eb21a868808be3a |
---|---|
oai_identifier_str |
oai:repositorio.uan.edu.co:123456789/1702 |
network_acronym_str |
UAntonioN2 |
network_name_str |
Repositorio UAN |
repository_id_str |
|
dc.title.es_ES.fl_str_mv |
Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales |
title |
Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales |
spellingShingle |
Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales Cobots Auditoría de sistemas Controles Fraudes Malas prácticas Cobots Systems Audit Controls Fraud Bad practices |
title_short |
Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales |
title_full |
Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales |
title_fullStr |
Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales |
title_full_unstemmed |
Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales |
title_sort |
Auditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales |
dc.creator.fl_str_mv |
Benavides Vallejo, Hector Ancizar |
dc.contributor.advisor.spa.fl_str_mv |
Arenas, Hernan Dario Fuentes, Jenny |
dc.contributor.author.spa.fl_str_mv |
Benavides Vallejo, Hector Ancizar |
dc.subject.es_ES.fl_str_mv |
Cobots Auditoría de sistemas Controles Fraudes Malas prácticas |
topic |
Cobots Auditoría de sistemas Controles Fraudes Malas prácticas Cobots Systems Audit Controls Fraud Bad practices |
dc.subject.keyword.es_ES.fl_str_mv |
Cobots Systems Audit Controls Fraud Bad practices |
description |
In the article, the characteristics of cobots are identified which allow the development of collaborative work with humans, causing industrial processes to be carried out with efficiency, high quality standards, opportunity and cost reduction. On the other hand, vulnerabilities that impact cobots with a high-risk severity, in software and hardware are determined through remote and physical attacks, which can manipulate this technology, causing from the theft of classified information to damage in the human resource for injuries. Therefore, the existing controls in the cobots are identified and evaluated, applying the ISO 19011 methodology supported by risk management (ISO 31000), obtaining as a result that the controls are not efficient, nor appropriate to mitigate risks, therefore, It is recommended that systems audits be implemented, such as a detective control, which should be carried out periodically in order to evaluate the state of the controls and in turn analyze whether it is necessary to implement new controls. |
publishDate |
2020 |
dc.date.issued.spa.fl_str_mv |
2020-06-04 |
dc.date.accessioned.none.fl_str_mv |
2021-02-23T21:46:43Z |
dc.date.available.none.fl_str_mv |
2021-02-23T21:46:43Z |
dc.type.spa.fl_str_mv |
Trabajo de grado (Pregrado y/o Especialización) |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
format |
http://purl.org/coar/resource_type/c_7a1f |
dc.identifier.uri.none.fl_str_mv |
http://repositorio.uan.edu.co/handle/123456789/1702 |
dc.identifier.bibliographicCitation.spa.fl_str_mv |
Müller-Abdelrazeq, S., Schönefeld, K., Haberstroh, M., & Hees, F. (2019). Interacting with Collaborative Robots—A Study on Attitudes and Acceptance in Industrial Contexts. Oliver Korn, 101-117. Apa, L. (22 de 08 de 2017). Ioactive. Obtenido de Ioactive: https://ioactive.com/exploiting-industrial-collaborative-robots/ Chinecherem, O. O., Kenneth, N. C., & Hycient, I. (2017). Robotics and artificial Intelligence: differences and similarities. International journal of computer science and information security, 26-28. Fast-Berglund, Å., Palmkvist, F., Nyqvist, P., Ekered, S., & Åkerman, M. (2016). Evaluating cobots for final assembly. Elsevier B.V, 175-180. Hussain, J., Memon, S., Mehmood , S., Usman, M., Ali Khan, R., Abbasi, S., . . . Hussain, Z. (2017). A user friendly security framework for the protectionof confidential information. International Journal of Computer Science and Network Security, 2015-223. IEC-61508. (2010). Functional safety of electrical/electronic/ (2 ed.). International Electrotechnical Commission. ISACA. (2018). COBIT2019. Schaumburg: ISACA. ISO/TS-15066. (2016). Robots and robotic devices — Collaborative robots (1 ed.). Switzerland: International Organization for Standardization. ISO-10218-1. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 1: Robots (2 ed.). Switzerland: International Organization for Standardization. ISO-10218-2. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 2: Robot systems and integration. Switzerland: International Organization for Standardization. ISO-12100. (2010). Safety of machinery — General principles for design — Risk assessment and risk reduction (1 ed.). Switzerland: International Organization for Standardization. ISO-13849-1. (2015). Safety of machinery — Safety-related parts of control systems — Part 1: General principles for design (3 ed.). Switzerland: International Organization for Standardization. Kovacs, E. (03 de 05 de 2017). Securityweek. Obtenido de Securityweek: https://www.securityweek.com/industrial-robots-vulnerable-remote-hacker-attacks Kuka. (23 de 02 de 2018). Kuka. Obtenido de Kuka: https://www.fircroft.com/blogs/cobots-will-play-an-important-role-in-helping-to-fill-the-uks-85423123655 Patil, P. (2016). Artificial intelligence incyber security. International journal of research in computer applications and robotics, 1-5. Tanenbaum, A. (2012). Redes de computadoras (Quinta ed.). México: Pearson educación. Univelsal-Robots. (11 de 07 de 2018). Univelsal robots. Obtenido de Univelsal robots: https://www.universal-robots.com/about-universal-robots/news-centre/the-history-behind-collaborative-robots-cobots/ Vicentini, F., Ruggeri, M., Dariz, L., Pecora, A., Maiolo, L., Polese, D., . . . Molinari, L. (2014). Wireless sensor networks and safe protocols for user tracking in human-Robot cooperative workspaces. IEEE, 1274-1279. |
url |
http://repositorio.uan.edu.co/handle/123456789/1702 |
identifier_str_mv |
Müller-Abdelrazeq, S., Schönefeld, K., Haberstroh, M., & Hees, F. (2019). Interacting with Collaborative Robots—A Study on Attitudes and Acceptance in Industrial Contexts. Oliver Korn, 101-117. Apa, L. (22 de 08 de 2017). Ioactive. Obtenido de Ioactive: https://ioactive.com/exploiting-industrial-collaborative-robots/ Chinecherem, O. O., Kenneth, N. C., & Hycient, I. (2017). Robotics and artificial Intelligence: differences and similarities. International journal of computer science and information security, 26-28. Fast-Berglund, Å., Palmkvist, F., Nyqvist, P., Ekered, S., & Åkerman, M. (2016). Evaluating cobots for final assembly. Elsevier B.V, 175-180. Hussain, J., Memon, S., Mehmood , S., Usman, M., Ali Khan, R., Abbasi, S., . . . Hussain, Z. (2017). A user friendly security framework for the protectionof confidential information. International Journal of Computer Science and Network Security, 2015-223. IEC-61508. (2010). Functional safety of electrical/electronic/ (2 ed.). International Electrotechnical Commission. ISACA. (2018). COBIT2019. Schaumburg: ISACA. ISO/TS-15066. (2016). Robots and robotic devices — Collaborative robots (1 ed.). Switzerland: International Organization for Standardization. ISO-10218-1. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 1: Robots (2 ed.). Switzerland: International Organization for Standardization. ISO-10218-2. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 2: Robot systems and integration. Switzerland: International Organization for Standardization. ISO-12100. (2010). Safety of machinery — General principles for design — Risk assessment and risk reduction (1 ed.). Switzerland: International Organization for Standardization. ISO-13849-1. (2015). Safety of machinery — Safety-related parts of control systems — Part 1: General principles for design (3 ed.). Switzerland: International Organization for Standardization. Kovacs, E. (03 de 05 de 2017). Securityweek. Obtenido de Securityweek: https://www.securityweek.com/industrial-robots-vulnerable-remote-hacker-attacks Kuka. (23 de 02 de 2018). Kuka. Obtenido de Kuka: https://www.fircroft.com/blogs/cobots-will-play-an-important-role-in-helping-to-fill-the-uks-85423123655 Patil, P. (2016). Artificial intelligence incyber security. International journal of research in computer applications and robotics, 1-5. Tanenbaum, A. (2012). Redes de computadoras (Quinta ed.). México: Pearson educación. Univelsal-Robots. (11 de 07 de 2018). Univelsal robots. Obtenido de Univelsal robots: https://www.universal-robots.com/about-universal-robots/news-centre/the-history-behind-collaborative-robots-cobots/ Vicentini, F., Ruggeri, M., Dariz, L., Pecora, A., Maiolo, L., Polese, D., . . . Molinari, L. (2014). Wireless sensor networks and safe protocols for user tracking in human-Robot cooperative workspaces. IEEE, 1274-1279. |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.rights.none.fl_str_mv |
Acceso abierto |
dc.rights.license.spa.fl_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) |
dc.rights.uri.spa.fl_str_mv |
https://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) Acceso abierto https://creativecommons.org/licenses/by-nc-nd/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.publisher.spa.fl_str_mv |
Universidad Antonio Nariño |
dc.publisher.program.spa.fl_str_mv |
Especialización en Auditoría de Sistemas (Virtual) |
dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ciencias Económicas y Administrativas |
dc.publisher.campus.spa.fl_str_mv |
Bogotá - Sur |
institution |
Universidad Antonio Nariño |
bitstream.url.fl_str_mv |
https://repositorio.uan.edu.co/bitstreams/21e178a7-11be-46e0-b759-5541638a62b8/download https://repositorio.uan.edu.co/bitstreams/79825204-bc7a-4ef9-82e2-3aaa6848b3e1/download https://repositorio.uan.edu.co/bitstreams/864feeac-9923-4a7c-a390-8da44bc88ffa/download https://repositorio.uan.edu.co/bitstreams/9fef4c0e-7f9a-409d-8e9d-5667b7b12243/download https://repositorio.uan.edu.co/bitstreams/8a188005-38b9-4d37-aa2a-7f0a3fc6770c/download https://repositorio.uan.edu.co/bitstreams/264fa081-43f0-452f-8dd8-3156562843aa/download https://repositorio.uan.edu.co/bitstreams/becb4ef5-2d57-48aa-aa83-c0756fb3fa22/download https://repositorio.uan.edu.co/bitstreams/54158011-3d60-4ddd-a637-a66653b8f001/download |
bitstream.checksum.fl_str_mv |
8c03cc96a38c8436105d1df29b9429ba ba5599f88f244c5cb222ad52ccf52a1e 9868ccc48a14c8d591352b6eaf7f6239 2e388663398085f69421c9e4c5fcf235 89688f29dc3bfe1e3183e88250a79f50 5dbe86c1111d64f45ba435df98fdc825 16945f43b510218cc82579ded497f358 e6a6f38aef88f82b01dccf154404d421 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional UAN |
repository.mail.fl_str_mv |
alertas.repositorio@uan.edu.co |
_version_ |
1814300292870569984 |
spelling |
Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)Acceso abiertohttps://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Arenas, Hernan DarioFuentes, JennyBenavides Vallejo, Hector Ancizar2021-02-23T21:46:43Z2021-02-23T21:46:43Z2020-06-04http://repositorio.uan.edu.co/handle/123456789/1702Müller-Abdelrazeq, S., Schönefeld, K., Haberstroh, M., & Hees, F. (2019). Interacting with Collaborative Robots—A Study on Attitudes and Acceptance in Industrial Contexts. Oliver Korn, 101-117.Apa, L. (22 de 08 de 2017). Ioactive. Obtenido de Ioactive: https://ioactive.com/exploiting-industrial-collaborative-robots/Chinecherem, O. O., Kenneth, N. C., & Hycient, I. (2017). Robotics and artificial Intelligence: differences and similarities. International journal of computer science and information security, 26-28.Fast-Berglund, Å., Palmkvist, F., Nyqvist, P., Ekered, S., & Åkerman, M. (2016). Evaluating cobots for final assembly. Elsevier B.V, 175-180.Hussain, J., Memon, S., Mehmood , S., Usman, M., Ali Khan, R., Abbasi, S., . . . Hussain, Z. (2017). A user friendly security framework for the protectionof confidential information. International Journal of Computer Science and Network Security, 2015-223.IEC-61508. (2010). Functional safety of electrical/electronic/ (2 ed.). International Electrotechnical Commission.ISACA. (2018). COBIT2019. Schaumburg: ISACA.ISO/TS-15066. (2016). Robots and robotic devices — Collaborative robots (1 ed.). Switzerland: International Organization for Standardization.ISO-10218-1. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 1: Robots (2 ed.). Switzerland: International Organization for Standardization.ISO-10218-2. (2011). Robots and robotic devices — Safety requirements for industrial robots — Part 2: Robot systems and integration. Switzerland: International Organization for Standardization.ISO-12100. (2010). Safety of machinery — General principles for design — Risk assessment and risk reduction (1 ed.). Switzerland: International Organization for Standardization.ISO-13849-1. (2015). Safety of machinery — Safety-related parts of control systems — Part 1: General principles for design (3 ed.). Switzerland: International Organization for Standardization.Kovacs, E. (03 de 05 de 2017). Securityweek. Obtenido de Securityweek: https://www.securityweek.com/industrial-robots-vulnerable-remote-hacker-attacksKuka. (23 de 02 de 2018). Kuka. Obtenido de Kuka: https://www.fircroft.com/blogs/cobots-will-play-an-important-role-in-helping-to-fill-the-uks-85423123655Patil, P. (2016). Artificial intelligence incyber security. International journal of research in computer applications and robotics, 1-5.Tanenbaum, A. (2012). Redes de computadoras (Quinta ed.). México: Pearson educación. Univelsal-Robots. (11 de 07 de 2018). Univelsal robots. Obtenido de Univelsal robots: https://www.universal-robots.com/about-universal-robots/news-centre/the-history-behind-collaborative-robots-cobots/Vicentini, F., Ruggeri, M., Dariz, L., Pecora, A., Maiolo, L., Polese, D., . . . Molinari, L. (2014). Wireless sensor networks and safe protocols for user tracking in human-Robot cooperative workspaces. IEEE, 1274-1279.In the article, the characteristics of cobots are identified which allow the development of collaborative work with humans, causing industrial processes to be carried out with efficiency, high quality standards, opportunity and cost reduction. On the other hand, vulnerabilities that impact cobots with a high-risk severity, in software and hardware are determined through remote and physical attacks, which can manipulate this technology, causing from the theft of classified information to damage in the human resource for injuries. Therefore, the existing controls in the cobots are identified and evaluated, applying the ISO 19011 methodology supported by risk management (ISO 31000), obtaining as a result that the controls are not efficient, nor appropriate to mitigate risks, therefore, It is recommended that systems audits be implemented, such as a detective control, which should be carried out periodically in order to evaluate the state of the controls and in turn analyze whether it is necessary to implement new controls.En el artículo se identifican las características de los cobots las cuales permiten el desarrollo de un trabajo colaborativo con humanos, ocasionando que los procesos industriales se realicen con eficiencia, altos estándares de calidad, oportunidad y reducción de costos. Por otra parte, se determinan las vulnerabilidades que impactan en los cobots con una severidad de riesgo alto, en el software y el hardware a través de ataques remotos y físicos, los cuales pueden manipular esta tecnología, causando desde el robo de información clasificada hasta daños en el recurso humano por lesiones. Por consiguiente se identifican y evalúan los controles existentes en los cobots, aplicando la metodología ISO 19011 apoyada por la gestión de riesgos (ISO 31000), obteniendo como resultado, que los controles no son eficientes, ni apropiados para mitigar los riesgos, por lo tanto, se recomienda que se implementen auditorías de sistemas, como un control detectivo, las cuales deben ejecutarse periódicamente con el objetivo de evaluar el estado de los controles y a su vez analizar si es necesario implementar nuevos controles.Especialista en Auditoría de SistemasEspecializaciónVirtualspaUniversidad Antonio NariñoEspecialización en Auditoría de Sistemas (Virtual)Facultad de Ciencias Económicas y AdministrativasBogotá - SurCobotsAuditoría de sistemasControlesFraudesMalas prácticasCobotsSystems AuditControlsFraudBad practicesAuditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industrialesTrabajo de grado (Pregrado y/o Especialización)http://purl.org/coar/resource_type/c_7a1fhttp://purl.org/coar/version/c_970fb48d4fbd8a85ORIGINAL2020_HectorAncizarBenavidesVallejo2020_HectorAncizarBenavidesVallejoAuditoría a los controles utilizados en los cobots, para evitar fraudes en procesos industriales.application/pdf745683https://repositorio.uan.edu.co/bitstreams/21e178a7-11be-46e0-b759-5541638a62b8/download8c03cc96a38c8436105d1df29b9429baMD512020_HectorAncizarBenavidesVallejo_Autorización2020_HectorAncizarBenavidesVallejo_AutorizaciónAutorización de Autoresapplication/pdf640638https://repositorio.uan.edu.co/bitstreams/79825204-bc7a-4ef9-82e2-3aaa6848b3e1/downloadba5599f88f244c5cb222ad52ccf52a1eMD54CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8811https://repositorio.uan.edu.co/bitstreams/864feeac-9923-4a7c-a390-8da44bc88ffa/download9868ccc48a14c8d591352b6eaf7f6239MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-82710https://repositorio.uan.edu.co/bitstreams/9fef4c0e-7f9a-409d-8e9d-5667b7b12243/download2e388663398085f69421c9e4c5fcf235MD55TEXT2020_HectorAncizarBenavidesVallejo.txt2020_HectorAncizarBenavidesVallejo.txtExtracted texttext/plain43204https://repositorio.uan.edu.co/bitstreams/8a188005-38b9-4d37-aa2a-7f0a3fc6770c/download89688f29dc3bfe1e3183e88250a79f50MD562020_HectorAncizarBenavidesVallejo_Autorización.txt2020_HectorAncizarBenavidesVallejo_Autorización.txtExtracted texttext/plain5https://repositorio.uan.edu.co/bitstreams/264fa081-43f0-452f-8dd8-3156562843aa/download5dbe86c1111d64f45ba435df98fdc825MD58THUMBNAIL2020_HectorAncizarBenavidesVallejo.jpg2020_HectorAncizarBenavidesVallejo.jpgGenerated Thumbnailimage/jpeg15763https://repositorio.uan.edu.co/bitstreams/becb4ef5-2d57-48aa-aa83-c0756fb3fa22/download16945f43b510218cc82579ded497f358MD572020_HectorAncizarBenavidesVallejo_Autorización.jpg2020_HectorAncizarBenavidesVallejo_Autorización.jpgGenerated Thumbnailimage/jpeg16825https://repositorio.uan.edu.co/bitstreams/54158011-3d60-4ddd-a637-a66653b8f001/downloade6a6f38aef88f82b01dccf154404d421MD59123456789/1702oai:repositorio.uan.edu.co:123456789/17022024-10-21 12:23:36.383https://creativecommons.org/licenses/by-nc-nd/4.0/Acceso abiertoopen.accesshttps://repositorio.uan.edu.coRepositorio Institucional UANalertas.repositorio@uan.edu.coQWwgaW5jbHVpciBpbmZvcm1hY2nDs24gZW4gZWwgUmVwb3NpdG9yaW8gSW5zdGl0dWNpb25hbCBkZSBsYSAgVU5JVkVSU0lEQUQgQU5UT05JTyBOQVJJw5FPLCBlbCBhdXRvcihlcykgYXV0b3JpemEgYWwgU2lzdGVtYSBOYWNpb25hbCBkZSBCaWJsaW90ZWNhcyBwYXJhIGFsbWFjZW5hciB5IG1hbnRlbmVyIGxhIGluZm9ybWFjacOzbiAsIGNvbiBmaW5lcyBhY2Fkw6ltaWNvcyB5IGRlIG1hbmVyYSBncmF0dWl0YSwgIHBvbmdhIGEgZGlzcG9zaWNpw7NuIGRlIGxhIGNvbXVuaWRhZCBzdXMgY29udGVuaWRvcyBkw6FuZG9sZSB2aXNpYmlsaWRhZCBhIGxvcyBtaXNtb3MsIHNlIGVudGllbmRlIHF1ZSBlbChsb3MpIGF1dG9yKGVzKSBhY2VwdGEobik6IAoKMS4JUXVlIGxvcyB1c3VhcmlvcyBpbnRlcm5vcyB5IGV4dGVybm9zIGRlIGxhIEluc3RpdHVjacOzbiBwdWVkYW4gY29uc3VsdGFyIGVsIGNvbnRlbmlkbyBkZSBlc3RlIHRyYWJham8gZW4gbG9zIHNpdGlvcyB3ZWIgcXVlIGFkbWluaXN0cmEgbGEgVW5pdmVyc2lkYWQgQW50b25pbyBOYXJpw7FvLCBlbiBCYXNlIGRlIERhdG9zLCBlbiBvdHJvcyBDYXTDoWxvZ29zIHkgZW4gb3Ryb3Mgc2l0aW9zIFdlYiwgUmVkZXMgeSBTaXN0ZW1hcyBkZSBJbmZvcm1hY2nDs24gbmFjaW9uYWxlcyBlIGludGVybmFjaW9uYWxlcyDigJxPcGVuIEFjY2Vzc+KAnSB5IGVuIGxhcyByZWRlcyBkZSBpbmZvcm1hY2nDs24gZGVsIHBhw61zIHkgZGVsIGV4dGVyaW9yLCBjb24gbGFzIGN1YWxlcyB0ZW5nYSBjb252ZW5pbyBsYSBVbml2ZXJzaWRhZCBBbnRvbmlvIE5hcmnDsW8uCgoyLglRdWUgc2UgcGVybWl0ZSBsYSBjb25zdWx0YSBhIGxvcyB1c3VhcmlvcyBpbnRlcmVzYWRvcyBlbiBlbCBjb250ZW5pZG8gZGUgZXN0ZSB0cmFiYWpvLCBjb24gZmluYWxpZGFkIGFjYWTDqW1pY2EsIG51bmNhIHBhcmEgdXNvcyBjb21lcmNpYWxlcywgc2llbXByZSB5IGN1YW5kbyBtZWRpYW50ZSBsYSBjb3JyZXNwb25kaWVudGUgY2l0YSBiaWJsaW9ncsOhZmljYSBzZSBsZSBkw6kgY3LDqWRpdG8gYWwgdHJhYmFqbyB5IGEgc3UgYXV0b3IuIEVzdG8gaW5jbHV5ZSBjdWFscXVpZXIgZm9ybWF0byBkaXNwb25pYmxlIGNvbm9jaWRvIG8gcG9yIGNvbm9jZXIuCgozLglRdWUgbG9zIGRlcmVjaG9zIHNvYnJlIGxvcyBkb2N1bWVudG9zIHNvbiBwcm9waWVkYWQgZGVsIGF1dG9yIG8gZGUgbG9zIGF1dG9yZXMgeSB0aWVuZW4gc29icmUgc3Ugb2JyYSwgZW50cmUgb3Ryb3MsIGxvcyBkZXJlY2hvcyBtb3JhbGVzIGEgcXVlIGhhY2VuIHJlZmVyZW5jaWEgY29uc2VydmFuZG8gbG9zIGNvcnJlc3BvbmRpZW50ZXMgZGVyZWNob3Mgc2luIG1vZGlmaWNhY2nDs24gbyByZXN0cmljY2nDs24gYWxndW5hIHB1ZXN0byBxdWUsIGRlIGFjdWVyZG8gY29uIGxhIGxlZ2lzbGFjacOzbiBjb2xvbWJpYW5hIGFwbGljYWJsZSwgZWwgcHJlc2VudGUgZXMgdW5hIGF1dG9yaXphY2nDs24gcXVlIGVuIG5pbmfDum4gY2FzbyBjb25sbGV2YSBsYSBlbmFqZW5hY2nDs24gZGVsIGRlcmVjaG8gZGUgYXV0b3IgeSBzdXMgY29uZXhvcy4KCjQuCVF1ZSBlbCBTaXN0ZW1hIE5hY2lvbmFsIGRlIEJpYmxpb3RlY2FzIGRlIGxhIFVuaXZlcnNpZGFkIEFudG9uaW8gTmFyacOxbyBwdWVkYSBjb252ZXJ0aXIgZWwgZG9jdW1lbnRvIGEgY3VhbHF1aWVyIG1lZGlvIG8gZm9ybWF0byBwYXJhIHByb3DDs3NpdG9zIGRlIHByZXNlcnZhY2nDs24gZGlnaXRhbC4gRGUgY29uZm9ybWlkYWQgY29uIGxvIGVzdGFibGVjaWRvIGVuIGxhIExleSAyMyBkZSAxOTgyLCBMZXkgNDQgZGUgMTk5MywgRGVjaXNpw7NuIEFuZGluYSAzNTEgZGUgMTk5MywgRGVjcmV0byA0NjAgZGUgMTk5NSB5IGRlbcOhcyBub3JtYXMgZ2VuZXJhbGVzIHNvYnJlIGxhIG1hdGVyaWEsIHV0aWxpY2UgeSB1c2UgZW4gdG9kYXMgc3VzIGZvcm1hcywgbG9zIGRlcmVjaG9zIHBhdHJpbW9uaWFsZXMgZGUgcmVwcm9kdWNjacOzbiwgY29tdW5pY2FjacOzbiBww7pibGljYSwgdHJhbnNmb3JtYWNpw7NuIHkgZGlzdHJpYnVjacOzbiBkZSBsYSBpbmZvcm1hY2nDs24gaW5jbHVpZGEgZW4gZXN0ZSByZXBvc2l0b3Jpby4KCjUuCVF1ZSBsYSBvYnJhIG9iamV0byBkZSBsYSBwcmVzZW50ZSBhdXRvcml6YWNpw7NuIGVzIG9yaWdpbmFsIHkgbGEgcmVhbGl6w7Mgc2luIHZpb2xhciBvIHVzdXJwYXIgZGVyZWNob3MgZGUgYXV0b3IgZGUgdGVyY2Vyb3MsIHBvciBsbyB0YW50byBsYSBvYnJhIGVzIGRlIHN1IGV4Y2x1c2l2YSBhdXRvcsOtYSB5IHRpZW5lIGxhIHRpdHVsYXJpZGFkIHNvYnJlIGxhIG1pc21hLiBFbiBjYXNvIGRlIHByZXNlbnRhcnNlIGN1YWxxdWllciByZWNsYW1hY2nDs24gbyBhY2Npw7NuIHBvciBwYXJ0ZSBkZSB1biB0ZXJjZXJvIGVuIGN1YW50byBhIGxvcyBkZXJlY2hvcyBkZSBhdXRvciBzb2JyZSBsYSBvYnJhIGVuIGN1ZXN0acOzbiwgRUwgQVVUT1IsIGFzdW1pcsOhIHRvZGEgbGEgcmVzcG9uc2FiaWxpZGFkLCB5IHNhbGRyw6EgZW4gZGVmZW5zYSBkZSBsb3MgZGVyZWNob3MgYXF1w60gYXV0b3JpemFkb3M7IHBhcmEgdG9kb3MgbG9zIGVmZWN0b3MgbGEgVW5pdmVyc2lkYWQgYWN0w7phIGNvbW8gdW4gdGVyY2VybyBkZSBidWVuYSBmZTsgYXPDrSBtaXNtbyBlbCBhY8OhIGZpcm1hbnRlIGRlamFyw6EgaW5kZW1uZSBhIGxhIFVuaXZlcnNpZGFkIGRlIGN1YWxxdWllciByZWNsYW1hY2nDs24gbyBwZXJqdWljaW8uCg== |