HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Policy managment for network security
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Policy managment for network security  
> Access to the content HTML Beginning of the presentation  
> Description  
> Context & Dates Talk made during the network security days of the CELAR, on 29 May 2000.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type 36 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Agenda
Hervé Schauer Consultants
Sécurité active et sécurité passive
Sécurité réactive
Complémentarité de la sécurité active et sécurité passive
Systèmes de détection d'intrusion
Contrôle d'accès réseau
Contrôle d'accès réseau sur le périmètre
Contrôle d'accès réseau dans le réseau de confiance
Exemples de contrôles d'accès réseau
   Exemple d'une plateforme de commerce électronique
   Exemple de cloisonnement de réseau
Sécurité appliquée au niveau réseau par rapport à la sécurité appliquée au niveau système d'exploitation et applicatifs
Gestion de réseau
Gestion de politique pour la sécurité réseau
Securité appliquée au niveau du périphérique ou au niveau global
Futur du contrôle d'accès réseau
Détection des incidents
Évolution de l'Internet
Dénis de service répartis
Infogérance
Modèles économiques
Conclusion
Références et ressources  
> Related documents
themeSecurity Policy
[Presentation]  Extended security management [24 September 2009 - French]
[Presentation]  Security and CIOs [6 October 2004 - French]
[Techno-watch]  IP Policy '01 [2 October 2001 - French]
[Presentation]  Network security policy management [9 March 2001 - French]
[Techno-watch]  Policy 2001 Workshop [31 January 2001 - French]
[Presentation]  Policy Management for Security vs Policy Management for QoS [15 September 2000 - English]
themeNetwork Security
[Presentation]  Forcasting in French cyberdefence doctrines [24 November 2010 - French]
[Presentation]  IPv6 Networks Discovery [30 May 2007 - French]
[Presentation]  IPv6: Network Security Threats [15 November 2006 - English]
[Presentation]  IPv6: impacts and threats [14 November 2006 - French]
[Presentation]  Manage IS security of wide enterprise [12 April 2005 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  Stakes of network security [31 March 2005 - French]
[Presentation]  Ethereal: an open-source network analyzer and a must-have security tool [2 February 2005 - French]
[Presentation]  Network security stakes [14 October 2004 - French]
[Techno-watch]  CanSecWest 2002 Conference [4 May 2002 - French]
[Presentation]  Network security: Introduction and Bluetooth [9 November 2000 - French]
[Article]  Networks Security [25 July 2000 - French]
[Presentation]  Firewalls, protection and supervision, VPNs: situation of the security tools market [20 January 2000 - French]
[Course]  TCP/IP Networks Security [25 November 1999 - French]
[Presentation]  Network security: intrusion risks and countermeasures [18 November 1999 - French]
[Presentation]  Network security techniques [6 March 1997 - French]
> Copyright © 2000, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 17 April 2002 at 16:36:14 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants