HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Software vulnerabilities: latest trends and possible solutions
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Software vulnerabilities: latest trends and possible solutions  
> Access to the content HTML Beginning of the presentation
PDF PDF version [135 KB]  
> Description Vulnerabilities lifecycle, exploits and risk management related to software vulnerabilities.  
> Context & Dates Talk presented during Eurosec 2005, on 23 March 2005.
 
> Author Jean-Baptiste Marchand 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Plan
Introduction aux vulnérabilités logicielles
Cycle de vie des vulnérabilités
Etapes du cycle de vie des vulnérabilités
Variations autour du cycle de vie
Exemples de cycles de vie (1/3)
Exemples de cycles de vie (2/3)
Exemples de cycles de vie (3/3)
Enjeux autour des vulnérabilités
Tendances : vulnérabilités
Tendances : exploits
Utilisations légitimes ou illégitimes d'exploits
Solutions techniques pour la gestion des vulnérabilités
Répertorier les actifs logiciels
Veille en vulnérabilités
Correction des vulnérabilités
Audit de vulnérabilités
Solutions complémentaires
Conclusion
Références : veille en vulnérabilités
Références : vulnérabilités  
> Related documents
themeAdvisories
[Service]  Security monitoring
[Article]  Patch 0 Day ! [26 February 2007 - French]
[Presentation]  Vulnerabilities: from discovery to exploitation [4 November 2004 - French]
[Standard]  Security Advisory Format [May 1999 - English]
themeIncidents
[Presentation]  Logging and incident processing [15 May 2008 - French]
[Presentation]  Logs and incident processing [29 March 2007 - French]
[Presentation]  Vulnerabilities: from discovery to exploitation [4 November 2004 - French]
[Tip]  Antimap [20 November 2001 - French]
[Tip]  How to react (technicaly) in case of intrusion [21 October 2000 - French]
[Presentation]  Intervention after compromision of a Unix server [11 July 2000 - French]
[Presentation]  Vulnerabilities: from discovery to exploitation [4 November 2004 - French]
> Copyright © 2005, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 29 Mars 2005 at 15:25:00 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants