Introduction to Information Security Presented to CERTConf 2000 September 26, 2000


Click here to start

Table of contents

Introduction to Information Security Presented to CERTConf 2000 September 26, 2000

Overview

Overview cont’d

Threat

Threat | Malware

Threat | Malware cont’d

Threat | Program Threats

Threat | Program Threats cont’d

Slide 9

Threat | Port Scans

Threat | Port Scans cont’d

Threat | Sniffers

Threat | Denial of Service

Threat | DoS cont’d

Slide 15

Threat | Misrepresentation

Threat | Misrepresentation cont’d

Threat | Vandalism

Threat | Theft

Threat | Theft cont’d

Slide 21

Threat | Other Vulnerabilities

Threat | Vulnerabilities cont’d

Slide 24

Slide 25

Threat | Size

Threat | Size cont’d

Slide 28

Threat | Trends

Threat | Trends cont’d

Slide 31

Responses

Response | Policy

Response | Policy cont’d

Response | Technology

Response | Technology cont’d

Slide 37

Slide 38

Slide 39

Slide 40

Slide 41

Slide 42

Slide 43

Slide 44

Slide 45

Response | Assessments

Response | Assessments cont’d

Slide 48

Resources

Resources cont’d

Slide 51

Slide 52

Slide 53

Questions... Discussion

Best viewed with
StarOffice

Download presentation