Area | Topic | Where to find information |
---|---|---|
Desktop Security | Web browsing | Chat with Romain http://www.cert.org/tech_tips/securing_browser/, http://noscript.net/ |
Desktop Security | Emails | Chat with Romain http:/cern.ch/security/recommendations/ |
Desktop Security | Instant messaging and VoIP | Chat with Romain |
Desktop Security | Windows security | https://winservices.web.cern.ch/winservices/Help/?kbid=050001 |
Desktop Security | Linux security | Armoring (Grid) Linux systems |
Desktop Security | PDAs and phone security | Chat with Romain |
Network Security | Connecting to CERN from home | SSH gateways SSH Socks proxy SSH agent SSH port forwarding Man-In-the-Middle information http://www.cert.org/tech_tips/home_networks.html |
Network Security | Wire(less) network security | Chat with Romain |
Host Security | Authenticating using SSH at CERN | http://indico.cern.ch/getFile.py/access?contribId=0&resId=0&materialId=slides&confId=43867 http://cern.ch/linux/docs/kerberos-access.shtml http://cern.ch/linux/scientific4/docs/rhel-rg-en-4/s1-kerberos-works.html http://cern.ch/linux/scientific4/docs/rhel-rg-en-4/s1-kerberos-additional-resources.html |
Host Security | AFS access control | Worldwide readable FS command PTS command kerberos AFS tokens |
Host Security | Managing root access | root access management in GD |
Host Security | Linux Rootkits | http://indico.cern.ch/materialDisplay.py?contribId=4&materialId=slides&confId=43866 http://toorcon.org/2007/talks/11/Gabe_Lawrence.ppt |
Host Security | Linux host integrity | Chat with Romain |
Software development | Web applications | http://indico.cern.ch/materialDisplay.py?contribId=38&sessionId=13&materialId=slides&confId=27391 |
Software development | Secure coding | http:/cern.ch/security/SecureSoftware/checklist.htm http:/cern.ch/info-secure-software/ http:/cern.ch/security/SecureSoftware/Seminar-080515.ppt |
Know your enemy | Underground economy | http://indico.cern.ch/getFile.py/access?contribId=1&resId=1&materialId=slides&confId=43865 |
Know your enemy | Common security vulnerabilities and exploitation techniques | Chat with Romain |
Know your enemy | Network traffic capture and live tampering | Chat with Romain |
Know your enemy | Automating exploit preparation and attacks | Chat with Romain |
Security incidents | Incident response, roles and procedures | Chat with Romain |
Security incidents | How to contain and resolve incidents | Chat with Romain |
Security incidents | Linux investigation tips and standard forensic techniques | Chat with Romain |