Security and the System Administrator

Security and the System Administrator

8/4/00


Click here to start


Table of Contents

Security and the System Administrator

Bio

Abstract

Security Objectives

PPT Slide

PPT Slide

PPT Slide

Character of Costs

Sources of loss

Other sources of loss

Jacobson’s Window

Jacobson’s Window

Jacobson’s Window

Jacobson’s Window

Jacobson’s Window

Jacobson’s Window

Jacobson’s Window

Characterization of Threats and Vulnerabilities

Attacks & Attackers

Targets

Cost of Attack

Cost of Attack

Cost of Attack

Targets

Value of Success

Cost to Victim

Cost of System Security is measured in :

Courtney’s Laws

Efficient Security Measures:

Policy

Why Systems Fail?

Sufficient Conditions for the Success of a Virus

Enterprise Security in the 90s

New Defaults

Recommendations

Strong Authentication

“We are not building toy systems anymore.”

Author: William Hugh Murray

Download presentation source




 


?Need help? Use our Contacts page.
Last changed: 8 Aug 2000 mc
LISA-NT 2000 index
Conference index
USENIX home