Download presentation
Presentation is loading. Please wait.
Published byIrma Chase Modified over 9 years ago
1
- 1 - Information Security
2
- 2 - Agenda A Brief History of Internet security What is Security What I worry about
3
- 3 - The Internet
4
- 4 - The Internet Worm Incident 2 November 1988 Used vulnerabilities in: Fingerd Sendmail ‘r’ commands Cracked password Consumed CPU Aka. ‘The Morris Worm’
5
- 5 - Firewalls
6
- 6 - Intrusion Detection
7
- 7 - DoS and DDoS
8
- 8 - Code Red
9
- 9 - Broadband
10
- 10 - CyberWar and …
11
- 11 - … CyberTerrorism
12
- 12 - Spy Ware / Ad Ware
13
- 13 - CyberCrime
14
- 14 - The CIA Triad Confidentiality Integrity Availability The state of being secret The state or quality of being entire or complete Present and ready for use The state of being secret The state or quality of being entire or complete Present and ready for use Security = Security
15
- 15 - A Definition Security is a Methodology for Handling Threats to Confidentiality, Integrity and Availability - i.e. Risk Management
16
- 16 - Things I Worry About Users IT People IT Vendors Nation-State conflict or Terrorists Email and Web Mobile Devices Anyone who thinks that I am responsible for Information Security
17
- 17 - Further Reading Bruce Schneier SANS Internet Storm Centre SecurityFocus Titan Rain Jericho Forum
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.