computer crime and security - ufiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf ·...
TRANSCRIPT
Page: 1
DN-040217-CConnors-REV3
Computer Crime and Security
Page: 2
DN-040217-CConnors-REV3
What we will cover:
Page: 3
DN-040217-CConnors-REV3
Security Fundamentals Threats, Security and Assets
Page: 4
DN-040217-CConnors-REV3
Security Fundamentals The Security Stack
Page: 5
DN-040217-CConnors-REV3
Security Fundamentals A Comprehensive Security Plan
Page: 6
DN-040217-CConnors-REV3
Security Fundamentals A Comprehensive Security Plan
Page: 7
DN-040217-CConnors-REV3
Security Fundamentals Microsoft Developers and Security “The Last Mile”
Page: 8
DN-040217-CConnors-REV3
Hacking Overview Most Pervasive Hacking Techniques
Page: 9
DN-040217-CConnors-REV3
Hacking Overview Definitions
Page: 10
DN-040217-CConnors-REV3
Hacking Overview Definitions (continued)
Page: 11
DN-040217-CConnors-REV3
Hacking Overview Definitions (continued)
Page: 12
DN-040217-CConnors-REV3
Computer Crime Metrics Unauthorized Use of Computer Systems Within the Last 12 Months
Page: 13
DN-040217-CConnors-REV3
Computer Crime Metrics Internet Connection is Increasingly Cited as a Frequent Point of
Attack
Page: 14
DN-040217-CConnors-REV3
Computer Crime Metrics Likely Sources of Attack
Page: 15
DN-040217-CConnors-REV3
Computer Crime Metrics Dollar Amount of Losses By Type
Page: 16
DN-040217-CConnors-REV3
Computer Crime and the law Applicable Laws
Page: 17
DN-040217-CConnors-REV3
Computer Crime and the law Legal Liability
Page: 18
DN-040217-CConnors-REV3
Reducing Your Security Risk Security Assessments
Page: 19
DN-040217-CConnors-REV3
Reducing Your Security Risk Getting Started
Page: 20
DN-040217-CConnors-REV3
Recovering from a Security Breach Disaster Recovery Plan
Page: 21
DN-040217-CConnors-REV3
Recovering from a Security Breach Disaster Recovery Considerations
Page: 22
DN-040217-CConnors-REV3
Principals of Secure Design Implement Application Security Best Practices
Page: 23
DN-040217-CConnors-REV3
Secure Design Implementation Security Best Practices
Page: 24
DN-040217-CConnors-REV3
Secure Design Implementation Security Best Practices… Continued
Page: 25
DN-040217-CConnors-REV3
Secure design Implementation Security Best Practices… Continued
Page: 26
DN-040217-CConnors-REV3
Demonstration 1
Page: 27
DN-040217-CConnors-REV3
A Sharing Slide
[ Share C ]
Page: 28
DN-040217-CConnors-REV3
Demonstration 2
Page: 29
DN-040217-CConnors-REV3
A Sharing Slide
[ Share B ]
Page: 30
DN-040217-CConnors-REV3
Demonstration 3
Page: 31
DN-040217-CConnors-REV3
A Sharing Slide
[ Share F ]
Page: 32
DN-040217-CConnors-REV3
Reducing Your Security Risk Assessment Tools
Page: 33
DN-040217-CConnors-REV3
Reducing Your Security Risk Product Security Best Practices
Page: 34
DN-040217-CConnors-REV3
Reducing your security risk Product Security Best Practices (continued)
Page: 35
DN-040217-CConnors-REV3
Reducing Your Security Risk Product Security Best Practices (continued)
Page: 36
DN-040217-CConnors-REV3
Additional Resources
Page: 37
DN-040217-CConnors-REV3
Get Up to Speed on .NET
Page: 38
DN-040217-CConnors-REV3
Where Can I Get MSDN?
Page: 39
DN-040217-CConnors-REV3
DevDays is coming to a city near you
Page: 40
DN-040217-CConnors-REV3
Questions?
Page: 41
DN-040217-CConnors-REV3
https://msevents.microsoft.com/emcui/welcomepage.aspx?eventid=1032244847&culture=en-us
Survey Slide