1 / 5

Computer Security Workshops

Computer Security Workshops. Summary – Workshop 1. Review. We have examined the following: How attackers and defenders can gain information for their own purposes Names and IP addresses Users / Passwords Ports / Services

tex
Download Presentation

Computer Security Workshops

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security Workshops Summary – Workshop 1

  2. Review • We have examined the following: • How attackers and defenders can gain information for their own purposes • Names and IP addresses • Users / Passwords • Ports / Services • How attackers and defenders can identify vulnerabilities on computer systems

  3. Defensive Use of This Material • Identify weaknesses in computer systems • Exposed ports / services • Bad passwords • Unused accounts • Remove those weaknesses • Remove unneeded services (more later) • Ensure active services are secure (more later) • Prevent bad passwords from being used • Remove unused accounts

  4. More To Be Done… • How do we apply this in a systematic way to harden a computer system and ensure system security? • If an attacker does get in, how can we detect that intrusion? • How can we respond to attacks? • How do we attempt to ensure a successful attacker can’t get in again using the same exploit? • Workshop Part 2

  5. Evaluation • Sheets to be distributed for workshop evaluation

More Related