Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Multi-layers in depth security
Go to: HSC Trainings
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Multi-layers in depth security  
> Access to the content HTML Beginning of the presentation
PDF PDF version [705 KB]
AdobeFlash Adobe Flash version  
> Description Presentation of information systems security by the security in depth principle with real examples toward a studient audience.  
> Context & Dates Talk presented during the Federez day, on 19 March 2011.
> Author Raphael Marichez (Raphael.Marichez@hsc.fr) 
> Type [ French - HTML ]  
> Abstract &
Table of content
Présentation du sujet
Présentation de l'auteur
Comment se protéger ?
Alors réflechissons...
Ce qu'on craint
Quoi/Qui nous menace
Ce qu'on redoute le plus
Quels scénarios mènent aux évènements redoutés ?
Paralelle avec la sûreté nucléaire
Prévenir, bloquer, renforcer...
Sécurité informatique : mauvais exemples
L'incident a lieu lors d'un alignement de failles
Défense en profondeur
Scénario 1 : se défendre contre les virus
Scénario 2 : PDF malveillant
Scénario 3 : usurpation de comptes du domaine
Détecter ?
Dans la vraie vie
Pour aller plus loins
Petit test
Petite question  
> Related documents
themeSecurity Architectures
[Article]  Évolution des attaques de type Cross Site Request Forgery [1 June 2007 - French]
[Presentation]  Tunnels detection at network border [2 June 2006 - French]
[Article]  Détection de tunnels aux limites du périmètre [2 June 2006 - French]
[Presentation]  How to make one's Internet security [5 January 2002 - French]
[Presentation]  Security architecture for connecting to the Internet [18 December 2001 - French]
[Article]  How to set up security systems? [29 March 2001 - French]
[Presentation]  How to insert VPNs in existing security architectures? [29 September 1999 - French]
[Article]  TAFIM - Technical Architecture Framework for Information Management [May 1997 - French]
[Article]  How to build a secure Internet access architecture? [October 1995 - French]
themeNetwork Security
[Presentation]  27C3 report [8 February 2011 - French]
[Presentation]  Forcasting in French cyberdefence doctrines [24 November 2010 - French]
[Presentation]  IPv6 Networks Discovery [30 May 2007 - French]
[Presentation]  IPv6: Network Security Threats [15 November 2006 - English]
[Presentation]  IPv6: impacts and threats [14 November 2006 - French]
[Presentation]  Manage IS security of wide enterprise [12 April 2005 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  Stakes of network security [31 March 2005 - French]
[Presentation]  Ethereal: an open-source network analyzer and a must-have security tool [2 February 2005 - French]
[Presentation]  Network security stakes [14 October 2004 - French]
[Techno-watch]  CanSecWest 2002 Conference [4 May 2002 - French]
[Presentation]  Network security: Introduction and Bluetooth [9 November 2000 - French]
[Article]  Networks Security [25 July 2000 - French]
[Presentation]  Policy managment for network security [29 May 2000 - French]
[Presentation]  Firewalls, protection and supervision, VPNs: situation of the security tools market [20 January 2000 - French]
[Course]  TCP/IP Networks Security [25 November 1999 - French]
[Presentation]  Network security: intrusion risks and countermeasures [18 November 1999 - French]
[Presentation]  Network security techniques [6 March 1997 - French]
> Copyright © 2011, Hervé Schauer Consultants, all rights reserved.


Last modified on 23 Mars 2011 at 11:51:40 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants