Aktiviteetti: Puhe- tai esitystyypit › Kutsuesitelmä
Kuvaus
The presentation explores how hackers actually break into systems and enterprises. It highlights the phases of a cyber-attack, the cyber kill-chain, internet-wide attacks, and government-level threats. An overview is given of typical vulnerabilities and possible backdoors in hardware, firmware, operating systems, and applications. The talk then explores ways to prevent these attacks, particularly how to design systems to be more resilient against attacks.