computer crime and security - ufiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf ·...

Post on 13-Apr-2018

224 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Page: 1

DN-040217-CConnors-REV3

Computer Crime and Security

Page: 2

DN-040217-CConnors-REV3

What we will cover:

Page: 3

DN-040217-CConnors-REV3

Security Fundamentals Threats, Security and Assets

Page: 4

DN-040217-CConnors-REV3

Security Fundamentals The Security Stack

Page: 5

DN-040217-CConnors-REV3

Security Fundamentals A Comprehensive Security Plan

Page: 6

DN-040217-CConnors-REV3

Security Fundamentals A Comprehensive Security Plan

Page: 7

DN-040217-CConnors-REV3

Security Fundamentals Microsoft Developers and Security “The Last Mile”

Page: 8

DN-040217-CConnors-REV3

Hacking Overview Most Pervasive Hacking Techniques

Page: 9

DN-040217-CConnors-REV3

Hacking Overview Definitions

Page: 10

DN-040217-CConnors-REV3

Hacking Overview Definitions (continued)

Page: 11

DN-040217-CConnors-REV3

Hacking Overview Definitions (continued)

Page: 12

DN-040217-CConnors-REV3

Computer Crime Metrics Unauthorized Use of Computer Systems Within the Last 12 Months

Page: 13

DN-040217-CConnors-REV3

Computer Crime Metrics Internet Connection is Increasingly Cited as a Frequent Point of

Attack

Page: 14

DN-040217-CConnors-REV3

Computer Crime Metrics Likely Sources of Attack

Page: 15

DN-040217-CConnors-REV3

Computer Crime Metrics Dollar Amount of Losses By Type

Page: 16

DN-040217-CConnors-REV3

Computer Crime and the law Applicable Laws

Page: 17

DN-040217-CConnors-REV3

Computer Crime and the law Legal Liability

Page: 18

DN-040217-CConnors-REV3

Reducing Your Security Risk Security Assessments

Page: 19

DN-040217-CConnors-REV3

Reducing Your Security Risk Getting Started

Page: 20

DN-040217-CConnors-REV3

Recovering from a Security Breach Disaster Recovery Plan

Page: 21

DN-040217-CConnors-REV3

Recovering from a Security Breach Disaster Recovery Considerations

Page: 22

DN-040217-CConnors-REV3

Principals of Secure Design Implement Application Security Best Practices

Page: 23

DN-040217-CConnors-REV3

Secure Design Implementation Security Best Practices

Page: 24

DN-040217-CConnors-REV3

Secure Design Implementation Security Best Practices… Continued

Page: 25

DN-040217-CConnors-REV3

Secure design Implementation Security Best Practices… Continued

Page: 26

DN-040217-CConnors-REV3

Demonstration 1

Page: 27

DN-040217-CConnors-REV3

A Sharing Slide

[ Share C ]

Page: 28

DN-040217-CConnors-REV3

Demonstration 2

Page: 29

DN-040217-CConnors-REV3

A Sharing Slide

[ Share B ]

Page: 30

DN-040217-CConnors-REV3

Demonstration 3

Page: 31

DN-040217-CConnors-REV3

A Sharing Slide

[ Share F ]

Page: 32

DN-040217-CConnors-REV3

Reducing Your Security Risk Assessment Tools

Page: 33

DN-040217-CConnors-REV3

Reducing Your Security Risk Product Security Best Practices

Page: 34

DN-040217-CConnors-REV3

Reducing your security risk Product Security Best Practices (continued)

Page: 35

DN-040217-CConnors-REV3

Reducing Your Security Risk Product Security Best Practices (continued)

Page: 36

DN-040217-CConnors-REV3

Additional Resources

Page: 37

DN-040217-CConnors-REV3

Get Up to Speed on .NET

Page: 38

DN-040217-CConnors-REV3

Where Can I Get MSDN?

Page: 39

DN-040217-CConnors-REV3

DevDays is coming to a city near you

Page: 40

DN-040217-CConnors-REV3

Questions?

Page: 41

DN-040217-CConnors-REV3

https://msevents.microsoft.com/emcui/welcomepage.aspx?eventid=1032244847&culture=en-us

Survey Slide

top related