41
Page: 1 DN-040217-CConnors-REV3 Computer Crime and Security

Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

  • Upload
    vodang

  • View
    228

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 1

DN-040217-CConnors-REV3

Computer Crime and Security

Page 2: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 2

DN-040217-CConnors-REV3

What we will cover:

Page 3: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 3

DN-040217-CConnors-REV3

Security Fundamentals Threats, Security and Assets

Page 4: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 4

DN-040217-CConnors-REV3

Security Fundamentals The Security Stack

Page 5: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 5

DN-040217-CConnors-REV3

Security Fundamentals A Comprehensive Security Plan

Page 6: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 6

DN-040217-CConnors-REV3

Security Fundamentals A Comprehensive Security Plan

Page 7: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 7

DN-040217-CConnors-REV3

Security Fundamentals Microsoft Developers and Security “The Last Mile”

Page 8: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 8

DN-040217-CConnors-REV3

Hacking Overview Most Pervasive Hacking Techniques

Page 9: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 9

DN-040217-CConnors-REV3

Hacking Overview Definitions

Page 10: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 10

DN-040217-CConnors-REV3

Hacking Overview Definitions (continued)

Page 11: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 11

DN-040217-CConnors-REV3

Hacking Overview Definitions (continued)

Page 12: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 12

DN-040217-CConnors-REV3

Computer Crime Metrics Unauthorized Use of Computer Systems Within the Last 12 Months

Page 13: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 13

DN-040217-CConnors-REV3

Computer Crime Metrics Internet Connection is Increasingly Cited as a Frequent Point of

Attack

Page 14: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 14

DN-040217-CConnors-REV3

Computer Crime Metrics Likely Sources of Attack

Page 15: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 15

DN-040217-CConnors-REV3

Computer Crime Metrics Dollar Amount of Losses By Type

Page 16: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 16

DN-040217-CConnors-REV3

Computer Crime and the law Applicable Laws

Page 17: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 17

DN-040217-CConnors-REV3

Computer Crime and the law Legal Liability

Page 18: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 18

DN-040217-CConnors-REV3

Reducing Your Security Risk Security Assessments

Page 19: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 19

DN-040217-CConnors-REV3

Reducing Your Security Risk Getting Started

Page 20: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 20

DN-040217-CConnors-REV3

Recovering from a Security Breach Disaster Recovery Plan

Page 21: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 21

DN-040217-CConnors-REV3

Recovering from a Security Breach Disaster Recovery Considerations

Page 22: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 22

DN-040217-CConnors-REV3

Principals of Secure Design Implement Application Security Best Practices

Page 23: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 23

DN-040217-CConnors-REV3

Secure Design Implementation Security Best Practices

Page 24: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 24

DN-040217-CConnors-REV3

Secure Design Implementation Security Best Practices… Continued

Page 25: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 25

DN-040217-CConnors-REV3

Secure design Implementation Security Best Practices… Continued

Page 26: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 26

DN-040217-CConnors-REV3

Demonstration 1

Page 27: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 27

DN-040217-CConnors-REV3

A Sharing Slide

[ Share C ]

Page 28: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 28

DN-040217-CConnors-REV3

Demonstration 2

Page 29: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 29

DN-040217-CConnors-REV3

A Sharing Slide

[ Share B ]

Page 30: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 30

DN-040217-CConnors-REV3

Demonstration 3

Page 31: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 31

DN-040217-CConnors-REV3

A Sharing Slide

[ Share F ]

Page 32: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 32

DN-040217-CConnors-REV3

Reducing Your Security Risk Assessment Tools

Page 33: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 33

DN-040217-CConnors-REV3

Reducing Your Security Risk Product Security Best Practices

Page 34: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 34

DN-040217-CConnors-REV3

Reducing your security risk Product Security Best Practices (continued)

Page 35: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 35

DN-040217-CConnors-REV3

Reducing Your Security Risk Product Security Best Practices (continued)

Page 36: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 36

DN-040217-CConnors-REV3

Additional Resources

Page 37: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 37

DN-040217-CConnors-REV3

Get Up to Speed on .NET

Page 38: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 38

DN-040217-CConnors-REV3

Where Can I Get MSDN?

Page 39: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 39

DN-040217-CConnors-REV3

DevDays is coming to a city near you

Page 40: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 40

DN-040217-CConnors-REV3

Questions?

Page 41: Computer Crime and Security - UFiessilverstr.ufies.org/blog/msdn-webcast-computer-crime.pdf · Page: 7 DN-040217-CConnors-REV3 Security Fundamentals Microsoft Developers and Security

Page: 41

DN-040217-CConnors-REV3

https://msevents.microsoft.com/emcui/welcomepage.aspx?eventid=1032244847&culture=en-us

Survey Slide