 |
Presentations
To promote information security awareness throughout the community, CSRT presents various discussions and forums. Where possible, these presentations have been archived, and are listed below.
Management Standards Training 2010:
System Access and Security
Presentation from October 23, 2006:
Information Security
Presentation from May 22, 2006:
DePaul Information Security
Presentation from February 20, 2006:
Information Security
Presentations from Computer Security Awareness 2005:
Spam & Phishing
Top 10 Best Computer Security Practices
Identity Theft
Security at DePaul Introduction
Previous presentations:
Threats: You & Your PC (featured at the Nov. 2004 Safe Computing open house)
Learn about the wide variety of threats that you face when you're online.
PC Maintenance (featured at the Nov. 2004 Safe Computing open house)
Lots of great information on how to best maintain your PC and information, including tips on setting good passwords and backing up data.
Safety Tips (featured at the Nov. 2004 Safe Computing open house)
General advice on how to protect yourself from scams, viruses, and other threats online
Computer Security 101
General computer security concepts and basics covering firewalls, anti-virus software, spam, the changing Internet threats, and more. This presentation is also available in html format.
What's New on the Ether
CSRT presentation given to various entities regarding the state of network security in the university, trend analysis and other fun statistics. Also viewable in postscript and mgp formats.
Securing UNIX Hosts from Local Attack
"This presentation intends to help the audience better understand both security risks and techniques to combat local attacks against a UNIX host."
Servers In the Wild
INFOSEC presentation to TLT regarding distributed computing security and the threats and recommendations for increasing the university's security posture.
Data Leaks
"Through accident, misconfiguration or carelessness, one can find a great deal of information on the net that perhaps shouldn't be accessible. Furthermore, with the growth in caching, mirrors and archival projects, this data can persist for an indefinite amount of time. From data about vulnerable hosts to private email to router configurations, this talk will examine a small handful of examples as they relate to network security."
The Audience Is Listening
"The Internet, and the various resources it provides, allows for communications to occur globally in a manner of milliseconds. Data communications traversing the Internet run the risk of being intercepted by employers, government, and other entities for both hostile and non-hostile intent. This discussion examines the historical failure of secure communications across data links, how they apply to the modern Internet of today. Techniques of capturing data communications over the Internet will be discussed, and solutions for decreasing your level of exposure and risk."
Current Internet Threats
"Nothing can guarantee complete protection from the threats that exist on the Internet. Worms, viruses, and other malicious attacks are making the battle more complex every day. But it is important to make a concerted "due diligence" effort to protect your information systems. This presentation will explore exploits and types of attacks while offering ways to secure your systems."
|
 |