Главная
Study mode:
on
1
Introduction
2
Becky Days
3
Shaquille ONeal
4
Jack ONeal
5
What is Computer Security
6
The Real Real Picture of Security
7
Software Design Implementation
8
System Configuration Management
9
Trust Issues
10
Microsoft
11
System Complexity
12
Buffer Overflows
13
Windows Outlook Mail
14
Change of culture
15
Time to market
16
System configuration and management
17
Active server pages
18
Cache manipulation and problems
19
Site Server
20
Management
21
Misplaced Trust
22
System Reliability Issues
23
Security Challenges
24
TCPIP Permissions
25
System Models
26
Digital Content
27
The Two Cents
28
Personal Favorites
29
Book Recommendations
30
Questions
Description:
Explore a comprehensive overview of computer security challenges and best practices in this 48-minute Black Hat USA 1999 conference talk by Rebecca Bace. Delve into the real-world picture of security, covering topics such as software design implementation, system configuration management, and trust issues. Examine the complexities of modern systems, including buffer overflows, Windows Outlook Mail vulnerabilities, and active server page concerns. Gain insights into system reliability issues, TCP/IP permissions, and digital content security. Learn about misplaced trust, management challenges, and the changing culture of cybersecurity. Discover personal favorites and book recommendations from the speaker, and engage with thought-provoking questions to enhance your understanding of computer security beyond the textbook view.

Computer Security - Textbook View

Black Hat
Add to list
0:00 / 0:00