Outline
A- Introduction
– Impact of security attacks
– Impact of privacy attacks
B- Genesis of security and privacy attacks
–    Current state of public and private networks
–    Overview of Available technology and methodology options
C- Assessment of vulnerabilities
–    Evaluation of AS-IS scenario using standard checklists and tools
D- Preventing attacks
–    Process interventions for preventing attacks
–    Technology interventions for preventing attacks
E- Post attack activities & remedies
–    Immediate activities for recovering from attacks
–    Remedial activities for reaching to business as usual
F- Conclusion

Leave a Reply

Your email address will not be published. Required fields are marked *

Outline
A- Introduction
– Impact of security attacks
– Impact of privacy attacks
B- Genesis of security and privacy attacks
–    Current state of public and private networks
–    Overview of Available technology and methodology options
C- Assessment of vulnerabilities
–    Evaluation of AS-IS scenario using standard checklists and tools
D- Preventing attacks
–    Process interventions for preventing attacks
–    Technology interventions for preventing attacks
E- Post attack activities & remedies
–    Immediate activities for recovering from attacks
–    Remedial activities for reaching to business as usual
F- Conclusion

Leave a Reply

Your email address will not be published. Required fields are marked *