![Page 1: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/1.jpg)
Page: 1
DN-040217-CConnors-REV3
Computer Crime and Security
![Page 2: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/2.jpg)
Page: 2
DN-040217-CConnors-REV3
What we will cover:
![Page 3: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/3.jpg)
Page: 3
DN-040217-CConnors-REV3
Security Fundamentals Threats, Security and Assets
![Page 4: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/4.jpg)
Page: 4
DN-040217-CConnors-REV3
Security Fundamentals The Security Stack
![Page 5: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/5.jpg)
Page: 5
DN-040217-CConnors-REV3
Security Fundamentals A Comprehensive Security Plan
![Page 6: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/6.jpg)
Page: 6
DN-040217-CConnors-REV3
Security Fundamentals A Comprehensive Security Plan
![Page 7: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/7.jpg)
Page: 7
DN-040217-CConnors-REV3
Security Fundamentals Microsoft Developers and Security “The Last Mile”
![Page 8: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/8.jpg)
Page: 8
DN-040217-CConnors-REV3
Hacking Overview Most Pervasive Hacking Techniques
![Page 9: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/9.jpg)
Page: 9
DN-040217-CConnors-REV3
Hacking Overview Definitions
![Page 10: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/10.jpg)
Page: 10
DN-040217-CConnors-REV3
Hacking Overview Definitions (continued)
![Page 11: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/11.jpg)
Page: 11
DN-040217-CConnors-REV3
Hacking Overview Definitions (continued)
![Page 12: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/12.jpg)
Page: 12
DN-040217-CConnors-REV3
Computer Crime Metrics Unauthorized Use of Computer Systems Within the Last 12 Months
![Page 13: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/13.jpg)
Page: 13
DN-040217-CConnors-REV3
Computer Crime Metrics Internet Connection is Increasingly Cited as a Frequent Point of
Attack
![Page 14: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/14.jpg)
Page: 14
DN-040217-CConnors-REV3
Computer Crime Metrics Likely Sources of Attack
![Page 15: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/15.jpg)
Page: 15
DN-040217-CConnors-REV3
Computer Crime Metrics Dollar Amount of Losses By Type
![Page 16: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/16.jpg)
Page: 16
DN-040217-CConnors-REV3
Computer Crime and the law Applicable Laws
![Page 17: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/17.jpg)
Page: 17
DN-040217-CConnors-REV3
Computer Crime and the law Legal Liability
![Page 18: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/18.jpg)
Page: 18
DN-040217-CConnors-REV3
Reducing Your Security Risk Security Assessments
![Page 19: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/19.jpg)
Page: 19
DN-040217-CConnors-REV3
Reducing Your Security Risk Getting Started
![Page 20: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/20.jpg)
Page: 20
DN-040217-CConnors-REV3
Recovering from a Security Breach Disaster Recovery Plan
![Page 21: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/21.jpg)
Page: 21
DN-040217-CConnors-REV3
Recovering from a Security Breach Disaster Recovery Considerations
![Page 22: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/22.jpg)
Page: 22
DN-040217-CConnors-REV3
Principals of Secure Design Implement Application Security Best Practices
![Page 23: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/23.jpg)
Page: 23
DN-040217-CConnors-REV3
Secure Design Implementation Security Best Practices
![Page 24: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/24.jpg)
Page: 24
DN-040217-CConnors-REV3
Secure Design Implementation Security Best Practices… Continued
![Page 25: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/25.jpg)
Page: 25
DN-040217-CConnors-REV3
Secure design Implementation Security Best Practices… Continued
![Page 26: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/26.jpg)
Page: 26
DN-040217-CConnors-REV3
Demonstration 1
![Page 27: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/27.jpg)
Page: 27
DN-040217-CConnors-REV3
A Sharing Slide
[ Share C ]
![Page 28: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/28.jpg)
Page: 28
DN-040217-CConnors-REV3
Demonstration 2
![Page 29: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/29.jpg)
Page: 29
DN-040217-CConnors-REV3
A Sharing Slide
[ Share B ]
![Page 30: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/30.jpg)
Page: 30
DN-040217-CConnors-REV3
Demonstration 3
![Page 31: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/31.jpg)
Page: 31
DN-040217-CConnors-REV3
A Sharing Slide
[ Share F ]
![Page 32: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/32.jpg)
Page: 32
DN-040217-CConnors-REV3
Reducing Your Security Risk Assessment Tools
![Page 33: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/33.jpg)
Page: 33
DN-040217-CConnors-REV3
Reducing Your Security Risk Product Security Best Practices
![Page 34: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/34.jpg)
Page: 34
DN-040217-CConnors-REV3
Reducing your security risk Product Security Best Practices (continued)
![Page 35: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/35.jpg)
Page: 35
DN-040217-CConnors-REV3
Reducing Your Security Risk Product Security Best Practices (continued)
![Page 36: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/36.jpg)
Page: 36
DN-040217-CConnors-REV3
Additional Resources
![Page 37: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/37.jpg)
Page: 37
DN-040217-CConnors-REV3
Get Up to Speed on .NET
![Page 38: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/38.jpg)
Page: 38
DN-040217-CConnors-REV3
Where Can I Get MSDN?
![Page 39: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/39.jpg)
Page: 39
DN-040217-CConnors-REV3
DevDays is coming to a city near you
![Page 40: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/40.jpg)
Page: 40
DN-040217-CConnors-REV3
Questions?
![Page 41: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security](https://reader031.vdocuments.us/reader031/viewer/2022022508/5acfea1a7f8b9a4e7a8d42eb/html5/thumbnails/41.jpg)
Page: 41
DN-040217-CConnors-REV3
https://msevents.microsoft.com/emcui/welcomepage.aspx?eventid=1032244847&culture=en-us
Survey Slide