Cargando…
Computer Security: Computer security threats, vulnerabilities and attacks (3/4)
<!--HTML-->Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing inte...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
2012
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1450911 |
_version_ | 1780924924981936128 |
---|---|
author | Perez Perez, Antonio |
author_facet | Perez Perez, Antonio |
author_sort | Perez Perez, Antonio |
collection | CERN |
description | <!--HTML-->Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA.
With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services.
These lectures shall give an overview of general computer and information security, subsequently focus on the problems of creating secure applications and computer services, highlight the importance of security operations (i.e. prevention, protection, detection and response), delve into the specifies of securing the critical infrastructure and their digital control systems as well as securing cloud and distributed computing, and discuss the impact of so-called Web 2.0 technologies to security and privacy. |
id | cern-1450911 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2012 |
record_format | invenio |
spelling | cern-14509112022-11-03T08:15:51Zhttp://cds.cern.ch/record/1450911engPerez Perez, AntonioComputer Security: Computer security threats, vulnerabilities and attacks (3/4)Computer Security: Computer security threats, vulnerabilities and attacks (3/4)Academic Training Lecture Regular Programme<!--HTML-->Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an overview of general computer and information security, subsequently focus on the problems of creating secure applications and computer services, highlight the importance of security operations (i.e. prevention, protection, detection and response), delve into the specifies of securing the critical infrastructure and their digital control systems as well as securing cloud and distributed computing, and discuss the impact of so-called Web 2.0 technologies to security and privacy.oai:cds.cern.ch:14509112012 |
spellingShingle | Academic Training Lecture Regular Programme Perez Perez, Antonio Computer Security: Computer security threats, vulnerabilities and attacks (3/4) |
title | Computer Security: Computer security threats, vulnerabilities and attacks (3/4) |
title_full | Computer Security: Computer security threats, vulnerabilities and attacks (3/4) |
title_fullStr | Computer Security: Computer security threats, vulnerabilities and attacks (3/4) |
title_full_unstemmed | Computer Security: Computer security threats, vulnerabilities and attacks (3/4) |
title_short | Computer Security: Computer security threats, vulnerabilities and attacks (3/4) |
title_sort | computer security: computer security threats, vulnerabilities and attacks (3/4) |
topic | Academic Training Lecture Regular Programme |
url | http://cds.cern.ch/record/1450911 |
work_keys_str_mv | AT perezperezantonio computersecuritycomputersecuritythreatsvulnerabilitiesandattacks34 |