The Proceedings of the Information Systems Education Conference 2002: §122w    Home    Papers/Indices    prev (§121w)    Next (§123w)
    Workshop     Leading Edge and Emerging Technologies

Vulnerabilities from Assessment to Management

David Thomason    [a1] [a2]

Ninety-nine percent of all reported network intrusions result through the exploitation of known vulnerabilities or configuration errors, for which countermeasures were available. The Gartner group has added credibility to this statement by recently announcing that through 2005, 90 percent of cyber-attacks will exploit known security flaws for which a patch is available or a solution known. This workshop will focus on cyber-security vulnerabilities, from assessment, through countermeasure implementation, to continual management. Donít let security vulnerabilities leave your networks at the mercy of hackers, crackers and cyper terrorists. Learn how to pro-actively protect your critical information!

Comments and corrections to