HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > How to make one's Internet security
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|How to make one's Internet security  
> Access to the content HTML Beginning of the presentation
Video of the presentation in ASF format. - (56min - 22 MB)  
> Description Introduction to the key elements for designing an Internet security gateway in Morroco.  
> Context & Dates Talk given at the 7th Internet days of MISOC, Morrocan chapter of the Internet Society, in Rabat on 5 January 2002.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type 32 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Hervé Schauer Consultants
Les risques
Offres du marché
Méthodologie
Concepts de base de la sécurité réseau
Principes d'une architecture de sécurité
Architecture de commerce électronique
Sécurité au niveau du système d'exploitation
Compétence des exploitants
Coût d'une connexion Internet sécurisée
Conclusion  
> Related documents
themeSecurity Architectures
[Article]  Évolution des attaques de type Cross Site Request Forgery [1 June 2007 - French]
[Presentation]  Tunnels detection at network border [2 June 2006 - French]
[Article]  Détection de tunnels aux limites du périmètre [2 June 2006 - French]
[Presentation]  Security architecture for connecting to the Internet [18 December 2001 - French]
[Article]  How to set up security systems? [29 March 2001 - French]
[Presentation]  How to insert VPNs in existing security architectures? [29 September 1999 - French]
[Article]  TAFIM - Technical Architecture Framework for Information Management [May 1997 - French]
[Article]  How to build a secure Internet access architecture? [October 1995 - French]
themeInternet Access Platform
[Course]  Internet/intranet Security
[Presentation]  Deperimetrization or not ? [22 November 2007 - French]
[Presentation]  Internet Firewall Management [23 June 2002 - French]
[Presentation]  Security architecture for connecting to the Internet [18 December 2001 - French]
[Presentation]  Integration of security into the company's Internet/intranet development [26 May 2000 - French]
[Presentation]  Facility management of one's Internet security [23 September 1999 - French]
[Presentation]  Tests and evaluation of Internet security solutions [30 May 1997 - French]
[Presentation]  Bypassing Internet security gateways [19 March 1997 - French]
[Presentation]  Secured Internet Gateways [2 June 1994 - French]
[Presentation]  Choice criteria for an Internet security solution [April 1994 - French/English]
> Copyright © 2002, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 28 June 2005 at 12:54:48 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants