HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Controling the risks associated with e-business
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Controling the risks associated with e-business  
> Access to the content HTML Beginning of the presentation  
> Description
  • Evaluate the consequences of criminal activities on you activity
  • What are the most common attacks on Internet sites?
  • Initiating a global security approach to protect you site from intrusions and domain or brand name hijacking
  • How to ensure timely maintenance of informations to prevent fraud risks?  
  • > Context & Dates Conference on Internet sites insurance, organised by Development Institute, on 21 June 2000.
     
    > Author Hervé Schauer (Herve.Schauer@hsc.fr) 
    > Type 29 slides [ French - HTML ]  
    > Abstract &
    Table of content
    Flyleaf
    Plan
    Hervé Schauer Consultants

    Tentatives d'agressions
    Agressions sur les services visibles : serveur web
    Dénis de service répartis
    Conséquences des agressions

    Démarche de sécurisation
    Architecture réseau et matérielle
    Architecture logicielle
    Système d'exploitation
    Composants middleware
    Développements spécifiques
    Services associés
    Architecture multi-tiers
    Exploitation

    Détournement des noms de domaines
    Piratage du DNS
    Vol du nom de domaine au NIC

    Rôles et responsabilités

    Modèles économiques

    Infogérance

    Conclusion
    Références et ressources  

    > Related documents
    themeE-Business
    [Presentation]  Evolution of Cross-Site Request Forgery Attacks [1 June 2007 - French]
    [Presentation]  Web 2.0 : more ergonomic... and less secure ? [22 May 2007 - French]
    [Presentation]  Web Services and Security [10 September 2003 - French]
    [Presentation]  Risks and solutions of an e-business project [28 September 2001 - French]
    [Techno-watch]  Electronic Commerce on the Internet [9 May 1996 - English]
    [Techno-watch]  Télémarket sur Multicâble [26 February 1996 - French]
    [Techno-watch]  Globe-On-Line [12 July 1995 - French]
    [Techno-watch]  EverGreen [16 May 1995 - English]
    [Techno-watch]  Le réseau ARTUUS [15 May 1995 - French]
    themeRisks
    [Presentation]  ISO 27005 vs EBIOS, Mehari, RiskIT, ... [25 June 2010 - French]
    [Presentation]  Risk evolution for the SME/SMI [22 June 2010 - French]
    [Presentation]  ISO 27005 risk management methodology [15 April 2010 - French]
    [Presentation]  ISO 27005 risk management methodology [12 June 2009 - French]
    [Presentation]  Aristote seminary : Distributed Security : the reply of the CISO [11 June 2009 - French]
    [Presentation]  ISO 27001 and risk management [10 April 2008 - French]
    [Presentation]  ISO 27005 : Risk management [15 May 2007 - French]
    [Presentation]  ISO 27001, the standard of the future ? Wich role in our information systems security strategy ? [26 April 2007 - French]
    [Presentation]  ISO 27001 standards [28 March 2007 - French]
    [Presentation]  Manage new computer security issues [30 June 2004 - French]
    [Presentation]  DOS on Internet infrastructure [4 November 2003 - French]
    [Presentation]  Security risks from outside [29 October 2002 - French]
    [Presentation]  DBMS and security [1 April 2002 - French]
    [Presentation]  Risks and solutions of an e-business project [28 September 2001 - French]
    [Presentation]  Network security: intrusion risks and countermeasures [18 November 1999 - French]
    [Article]  About Intranets' Lack of Security [August 1999 - French]
    [Presentation]  Threats and risks in Internet/intranet security [19 March 1998 - French]
    [Presentation]  Bypassing Internet security gateways [19 March 1997 - French]
    [Presentation]  The risks of security gateways' bypassing [26 September 1996 - French]
    > Copyright © 2000, Hervé Schauer Consultants, all rights reserved.

     

    Last modified on 22 April 2002 at 15:03:21 CET - webmaster@hsc.fr
    Information on this server - © 1989-2010 Hervé Schauer Consultants