HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Security risks from outside
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Security risks from outside  
> Access to the content HTML Beginning of the presentation
PDF PDF version [60KB]  
> Description Introduction to security risks from outside and how to manage to get protected.  
> Context & Dates Talk made during the Symantec's Vision360 Enterprise Security Summit in Paris, on 29 October 2002.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Les risques
Exemples de risques
Conséquences
Etude du Clusif
Les failles techniques
Expérience HSC
La menace du firewall
Le cadre règlementaire
La sécurité dans le temps
Le problème humain
Analyse de risques
Gestion des risques
Formaliser les responsabilités
Choisir une stratégie
Choisir des solutions
Conclusion  
> Related documents
themeRisks
[Presentation]  ISO 27005 vs EBIOS, Mehari, RiskIT, ... [25 June 2010 - French]
[Presentation]  Risk evolution for the SME/SMI [22 June 2010 - French]
[Presentation]  ISO 27005 risk management methodology [15 April 2010 - French]
[Presentation]  ISO 27005 risk management methodology [12 June 2009 - French]
[Presentation]  Aristote seminary : Distributed Security : the reply of the CISO [11 June 2009 - French]
[Presentation]  ISO 27001 and risk management [10 April 2008 - French]
[Presentation]  ISO 27005 : Risk management [15 May 2007 - French]
[Presentation]  ISO 27001, the standard of the future ? Wich role in our information systems security strategy ? [26 April 2007 - French]
[Presentation]  ISO 27001 standards [28 March 2007 - French]
[Presentation]  Manage new computer security issues [30 June 2004 - French]
[Presentation]  DOS on Internet infrastructure [4 November 2003 - French]
[Presentation]  DBMS and security [1 April 2002 - French]
[Presentation]  Risks and solutions of an e-business project [28 September 2001 - French]
[Presentation]  Controling the risks associated with e-business [21 June 2000 - French]
[Presentation]  Network security: intrusion risks and countermeasures [18 November 1999 - French]
[Article]  About Intranets' Lack of Security [August 1999 - French]
[Presentation]  Threats and risks in Internet/intranet security [19 March 1998 - French]
[Presentation]  Bypassing Internet security gateways [19 March 1997 - French]
[Presentation]  The risks of security gateways' bypassing [26 September 1996 - French]
> Copyright © 2002, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 20 November 2002 at 16:26:45 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants