Host Based Security. John Scrimsher, CISSP [email protected] Pre-Quiz. Name Do you own a computer? What Brand? Email address City of Birth Have you ever had a computer virus?. Why Host Based Security?. Perimeter Security vs. Host Based. 66% $. 34% $$$. Why Host Based Security?.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Anything that you would not want deliberately installed on your computer.
Link goes to dllbat.com
"It\'s hard to imagine a more ridiculous situation: a handful of virus writers are playing unpunished with the Internet, and not one member of the Internet community can take decisive action to stop this lawlessness.
The problem is that the current architecture of the Internet is completely inconsistent with information security. The Internet community needs to accept mandatory user identification - something similar to driving licenses or passports.
We must have effective methods for identifying and prosecuting cyber criminals or we may end up losing the Internet as a viable resource."
Eugene KasperskyHead of Antivirus Research
… 70 percent of those asked said they would reveal their computer passwords for a …
Bar of chocolate
Schrage, Michael. 2005. Retrieved from http://www.technologyreview.com/articles/05/03/issue/review_password.asp?p=1
The biggest threat to the security of a company is not a computer virus, an unpatched hole in a key program or a badly installed firewall. In fact, the biggest threat could be you. What I found personally to be true was that it\'s easier to manipulate people rather than technology. Most of the time organizations overlook that human element.
Mitnick, Kevin, “How to Hack People.” BBC NewsOnline, October 14, 2002.