Beruflich Dokumente
Kultur Dokumente
2/24/15
SECURITY
PHILOSPHY
2/24/15
2/24/15
2/24/15
2/24/15
2/24/15
2/24/15
2/24/15
2/24/15
10
Security x Usability
2/24/15
11
2/24/15
12
Risk Analysis
2/24/15
13
Solution:
Never think your system is secure.
2/24/15
14
2/24/15
15
To win a war,
one must know the
way
Sun Tzu
The Art of War
2/24/15
16
2/24/15
17
MONITOR
2/24/15
18
2/24/15
19
2/24/15
20
Network Awareness
2/24/15
21
FUNDAMENTALS
2/24/15
22
ATTACKER
VULNERABILITY
INFORMATION SYSTEM
USERS
Vulnerable Systems
2/24/15
24
A vulnerability timeline
The Attacker/Intruder
The attacker can be called as:
Lamer, intruder, attacker
(wrongly used as hacker also)
Also secret organizations?
Also companies
(serious antivirus/defence economy)
2/24/15
26
27
The Attacker
2/24/15
28
2/24/15
29
2/24/15
30
Firewall
2/24/15
31
Firewall Basics
2/24/15
32
Encryption
2/24/15
33
Encryption
2/24/15
34
Encryption
2/24/15
35
2/24/15
36