Area | Topic | Where to find information |
---|---|---|
Desktop Security | Web browsing hygiene | Chat with Romain http://www.cert.org/tech_tips/securing_browser/, http://noscript.net/ |
Desktop Security | Emails hygiene | Chat with Romain http:/cern.ch/security/recommendations/ |
Desktop Security | Instant messaging and VoIP hygiene | Chat with Romain |
Desktop Security | Windows security | https://winservices.web.cern.ch/winservices/Help/?kbid=050001 |
Desktop Security | Linux security | Armoring (Grid) Linux systems |
Desktop Security | PDAs and phone security | Chat with Romain |
Network Security | Connecting to CERN from home | SSH gateways SSH Socks proxy http://www.cert.org/tech_tips/home_networks.html |
Network Security | Wire(less) network security | Chat with Romain |
Host Security | Authenticating using SSH at CERN | Chat with Romain |
Host Security | Managing root access | root access management in GD |
Host Security | Linux Rootkits | http://indico.cern.ch/materialDisplay.py?contribId=4&materialId=slides&confId=43866 http://toorcon.org/2007/talks/11/Gabe_Lawrence.ppt |
Host Security | Linux host integrity | Chat with Romain |
Software development | Web applications | http://indico.cern.ch/materialDisplay.py?contribId=38&sessionId=13&materialId=slides&confId=27391 |
Software development | Secure coding | http:/cern.ch/security/SecureSoftware/checklist.htm http:/cern.ch/info-secure-software/ http:/cern.ch/security/SecureSoftware/Seminar-080515.ppt |
Know your enemy | Underground economy | http://indico.cern.ch/getFile.py/access?contribId=1&resId=1&materialId=slides&confId=43865 |
Know your enemy | Common security vulnerabilities and exploitation techniques | Chat with Romain |
Know your enemy | Network traffic capture and live tampering | Chat with Romain |
Know your enemy | Automating exploit preparation and attacks | Chat with Romain |
Security incidents | Incident response, roles and procedures | Chat with Romain |
Security incidents | How to contain and resolve incidents | Chat with Romain |
Security incidents | Linux investigation tips and standard forensic techniques | Chat with Romain |