80 likes | 221 Views
Computer Security Workshops. Summary – Workshop 2. Review. We have examined the following: How defenders can harden their computer systems to ward off attackers How defenders can detect and start to respond to attack attempts and successful attacks The challenge of defending computer systems.
E N D
Computer Security Workshops Summary – Workshop 2
Review • We have examined the following: • How defenders can harden their computer systems to ward off attackers • How defenders can detect and start to respond to attack attempts and successful attacks • The challenge of defending computer systems
Principles To Remember • Security is a process, not a product – Bruce Schneier • Don’t rest on your laurels • Constant vigilance is necessary • Beware the weakest link • Maintain multiple layers of security where possible • Integrate technological, physical and social security
Other Major Pieces of the Puzzle • Developing Good Security Policies • Understanding Social Engineering • Physical Security • Network Security • Web Security • Database Security • Application Security
Lab Environment • VMWare, Isolated Network, Wireless Connectivity, Booting from Secondary Storage – the MOBILE environment • http://www.cs.uwec.edu/mobile • Next Step: adding Management and Configuration Tools • Contact wagnerpj@uwec.edu
Tools • List of tools and information/sources on web • http://www.cs.uwec.edu/mobile/securitymaterials.htm
Material / Exercises • 6-hour workshop can be adapted to be at least part of a full-term course on Computer Security • Can be adapted to teach students and security personnel as well as faculty • Contact: Paul Wagner, wagnerpj@uwec.edu • http://clics.cs.uwec.edu
Evaluation • Paper evaluation to be distributed • Comments welcome • Email: wagnerpj@uwec.edu