Table of contentsIntroduction to Information Security Presented to CERTConf 2000 September 26, 2000
Overview
Overview contd
Threat
Threat | Malware
Threat | Malware contd
Threat | Program Threats
Threat | Program Threats contd
Slide 9
Threat | Port Scans
Threat | Port Scans contd
Threat | Sniffers
Threat | Denial of Service
Threat | DoS contd
Slide 15
Threat | Misrepresentation
Threat | Misrepresentation contd
Threat | Vandalism
Threat | Theft
Threat | Theft contd
Slide 21
Threat | Other Vulnerabilities
Threat | Vulnerabilities contd
Slide 24
Slide 25
Threat | Size
Threat | Size contd
Slide 28
Threat | Trends
Threat | Trends contd
Slide 31
Responses
Response | Policy
Response | Policy contd
Response | Technology
Response | Technology contd
Slide 37
Slide 38
Slide 39
Slide 40
Slide 41
Slide 42
Slide 43
Slide 44
Slide 45
Response | Assessments
Response | Assessments contd
Slide 48
Resources
Resources contd
Slide 51
Slide 52
Slide 53
Questions... Discussion
|