Part I
Survivable Systems Initiative
.
Initiative Goal
.
Early Work
.
Activity
.
Attack Sophistication vs. Intruder Technical Knowledge
.
Vulnerability Exploit Cycle
.
Key Issues
.
Internet Growth 1988-1998\b
.
Initiative Strategies
.
CERT/CC Field of Vision
.
Vulnerability Analysis
.
Vulnerability Analysis
.
Security Practices and Training
.
Security Practices and Training
.
Security Practices and Training
.
Continuous Security Management
.
Survivable Network Analysis Method
.
Emergent Algorithm Simulation Environment & Language
.
Emergent Algorithm Simulation Environment & Language
.
ESP (The Extranet for Security Professionals)
.
Back to
Lectures
Heather L. Marko
Last Modified: December 1998