Cargando…

Computer Security: Computer security threats, vulnerabilities and attacks (3/4)

<!--HTML-->Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing inte...

Descripción completa

Detalles Bibliográficos
Autor principal: Perez Perez, Antonio
Lenguaje:eng
Publicado: 2012
Materias:
Acceso en línea:http://cds.cern.ch/record/1450911
_version_ 1780924924981936128
author Perez Perez, Antonio
author_facet Perez Perez, Antonio
author_sort Perez Perez, Antonio
collection CERN
description <!--HTML-->Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an overview of general computer and information security, subsequently focus on the problems of creating secure applications and computer services, highlight the importance of security operations (i.e. prevention, protection, detection and response), delve into the specifies of securing the critical infrastructure and their digital control systems as well as securing cloud and distributed computing, and discuss the impact of so-called Web 2.0 technologies to security and privacy.
id cern-1450911
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2012
record_format invenio
spelling cern-14509112022-11-03T08:15:51Zhttp://cds.cern.ch/record/1450911engPerez Perez, AntonioComputer Security: Computer security threats, vulnerabilities and attacks (3/4)Computer Security: Computer security threats, vulnerabilities and attacks (3/4)Academic Training Lecture Regular Programme<!--HTML-->Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an overview of general computer and information security, subsequently focus on the problems of creating secure applications and computer services, highlight the importance of security operations (i.e. prevention, protection, detection and response), delve into the specifies of securing the critical infrastructure and their digital control systems as well as securing cloud and distributed computing, and discuss the impact of so-called Web 2.0 technologies to security and privacy.oai:cds.cern.ch:14509112012
spellingShingle Academic Training Lecture Regular Programme
Perez Perez, Antonio
Computer Security: Computer security threats, vulnerabilities and attacks (3/4)
title Computer Security: Computer security threats, vulnerabilities and attacks (3/4)
title_full Computer Security: Computer security threats, vulnerabilities and attacks (3/4)
title_fullStr Computer Security: Computer security threats, vulnerabilities and attacks (3/4)
title_full_unstemmed Computer Security: Computer security threats, vulnerabilities and attacks (3/4)
title_short Computer Security: Computer security threats, vulnerabilities and attacks (3/4)
title_sort computer security: computer security threats, vulnerabilities and attacks (3/4)
topic Academic Training Lecture Regular Programme
url http://cds.cern.ch/record/1450911
work_keys_str_mv AT perezperezantonio computersecuritycomputersecuritythreatsvulnerabilitiesandattacks34