Tools and Procedures for Securing .Net Applications
2
Housekeeping
3
About Me
4
Cleveland C#/VB.Net User Group
5
What are the motives?
6
Dotfuscator
7
Encrypt/Decrypt
8
Points of Entry?
9
Engage User
10
Active Defense Monitoring
11
Out of Bounds Cost Trigger
12
Security Breech Strategy
13
Security Check List
14
Conclusion
15
References
16
Contact Info
Description:
Explore essential tools and procedures for securing .NET applications in this conference talk from BSides Cleveland 2018. Delve into topics such as encryption, decryption, points of entry, active defense monitoring, and out-of-bounds cost triggers. Learn about security breach strategies and gain insights into creating an effective security checklist. Discover the motives behind cyber attacks and understand how to implement robust security measures in your .NET projects.
Tools and Procedures for Securing .Net Applications