HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Information Systems Security in banking industrie
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Information Systems Security in banking industrie  
> Access to the content HTML Beginning of the presentation
PDF PDF version [334 KB]
AdobeFlash Adobe Flash version  
> Description Overview of security topics that concern the banking industry among others  
> Context & Dates Talk presented during the AlBM CFAO seminar on information secuity in the banking industry, on 25 May 2005.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Hervé Schauer Consultants
Plan
Enjeux en sécurité bancaire
Contexte
Problèmes et attaques
Autres problèmes en sécurité
Respect du cadre légal et règlementaire
Cadre normatif
Virus et vers : constat
Exemple de Blaster
Virus et vers : état des lieux
Virus et vers : perspectives
Infrastructures : constat
Exemple du déni de service Cisco
Scénario d'attaque
Exemples des pannes opérateurs
Infrastructures : perspectives
Pourriel (SPAM)
Attaques web
Hameçonnage (Phishing) : constat
Hameçonnage (Phishing) : perspectives
Sécurité dans les applications
Pourquoi les firewalls ?
Pourquoi le périmètre ?
En quoi consiste le périmètre ?
En quoi consiste le contrôle d'accès
HTTP/HTTPS
HTTPS
Télémaintenances
Mobilité et nomadisme
Internet et Telecom
Voix sur IP / Téléphonie sur IP
Au delà du périmètre
Firewall en plusieurs boîtes ou tout en un ?
Conclusion
Prochains rendez-vous
Ressources HSC
Remerciements  
> Related documents
themeNews
[Service]  Security monitoring
[Presentation]  Report from Black Hat USA 2009 [8 September 2009 - French]
[Presentation]  From ISS to risks and reverse [29 April 2009 - French]
[Presentation]  Black Hat Europe 2008 report - OSSIR [17 June 2008 - French]
[Presentation]  BlackHat06 report [12 September 2006 - French]
[Presentation]  Threats and preemptive security [18 May 2006 - French]
[Presentation]  Managing insecurity of spontaneous infrastructures [3 April 2006 - French]
[Presentation]  Spontaneous infrastructures : witch security ? [19 October 2005 - French]
[Presentation]  Today's security needs in networking [13 October 2005 - English]
[Presentation]  Firewalls are not dead [10 May 2005 - French]
[Presentation]  Stakes of security [19 April 2005 - French]
[Presentation]  Manage IS security of wide enterprise [12 April 2005 - French]
[Presentation]  Introduction - Stake and trends [January 2004 - French]
[Article]  2002, the year of all challenges [17 February 2002 - French]
[Article]  The security market news [29 March 2001 - French]
> Copyright © 2005, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 26 May 2005 at 10:46:47 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants