Jacomo Piccolini (ESR/RNP, BR)
Jacomo Piccolini will show CAIS/RNP monthly statistics, comparing them with DSHIELD and showing relevant information. $All information was collected over the past three years as a pilot-program of automated statistics. CAIS/RNP would like to hear some ideas/contributions from membership for better developing this pilot in order to release it for the FIRST community as soon as possible.
MD5: 5ed83a18ee8a41aa4e1f5db39cde978f
Format: application/pdf
Last Update: June 7th, 2024
Size: 612.1 Kb
Dr. Bernd Grobauer (DE)
To improve a European warning system requires the co-operation of European CERTs, for example when authoring security advisories. One of the goals of EISPP (the Europan Information Security Promotion Programme, a project funded by the European Union IST Program) is to develop a suitable cooperation model that allows CERTS to co-operatate efficiently and effectively in the creation of security advisories. $This talk will concentrate on one of the corner stones for CERT co-operation, a common advisory format, which will enable an easy exchange of advisory data between the four CERTs participating in EISPP. The advisory format merges the best-practice information regarding security advisories of these four CERTs. All EISPP CERTs are about to switch to the new advisory format, which makes the common advisory format not a theoretic proposal, but a living standard soon to be used in four EU countries.
MD5: 63e7db07645b7d411b0108b9cae72604
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.73 Mb
Cintia M.Imanishi (LAC Co.), Hiroki Iwai (LAC Co.), Yuu Arai (LAC Co.)
Dr. Wietse Z. Venema (IBM, US)
The author talks about memory forensics - finding out what a computer system has been doing recently by looking at memory dumps. With UNIX systems, some information disappears in minutes while other information survives for days. With Windows/XP systems, plaintext content from encrypted files is found to persist in main memory long after the user has logged off.
MD5: 16612633448d5cc76f54dfdfaa528040
Format: application/pdf
Last Update: June 7th, 2024
Size: 63.62 Kb
Ian CookIan Cook (GB)
This presentation will give an overview of all wireless network technologies but focuses on wireless Local Area Networks (LANs) used in a corporate environment employing the 802.11b standard. It will cover the key components and features of wireless LANs, key security issues, hacking and security tools: including a wireless IDS device, and specifies controls which organizations should consider applying in order to deploy them securely.
MD5: 0b6260a0e705737e0c094dbe839af977
Format: application/pdf
Last Update: June 7th, 2024
Size: 25.07 Mb
Nils Magnus (SecuCERT)
Focussing on the technical aspects of network security, convenient and easy-to-use scanners are available that check for vulnerabilities and misconfiguration. Though other important matters such as policies and user awareness exist, they will not be addressed by this talk.$These integrated tools are quite popular for penetration testing, but they lack many of the options that a truly-dedicated attacker would have at his hands. We will therefore present a top ten list of basic utilities which, supported by the powerful system commands in a Unix environment, form a toolbox that lets you find out the security level of your network before the miscreants(TM) do.$We will explain the objective and functionality of each tool and why this list is usually sufficient for any vulnerability assessment. We argue that there is not much need for more or others and would like to discuss this claim with the audience.
MD5: 461b7236a5a259371e53e527b9ae635f
Format: application/pdf
Last Update: June 7th, 2024
Size: 3.75 Mb
Hans Wassén (SUNet), Robert Olsson (SUNet)
Bifrost is a Linux distribution specialized for high performance Networking and Firewalling and based on Linux. This talk will be an introduction to:$ bifrost concept$ bifrost development -- linux kernel collaboration.fast ip forwarding/hw_flowcontrol$NAPI (New Linux Network API) performance testing$ Selecting hardware$ Real life deployment$ IP-login. Authentification of Network Users$ Platform for higher education (Sweden)$* Current research and development.
MD5: 090123cff4aff6dbd4b8a44659169244
Format: application/pdf
Last Update: June 7th, 2024
Size: 9.16 Mb