DescriptionAs KAUST grows, we are seeing more Unix computers on the KAUST network: Vital research data is stored on computers in addition to personal data such as financial info. Research Collaboration is going on between KAUST and other institutes. All of this information has to be shared and stored in a secure, protected manner. With recent attacks on information systems such as the heartbleed bug, securing Unix computers and the stored information has become more critical than ever. This seminar’s goal is to highlight the need and importance of securing information from a network perspective as well as at the computer level with emphasis on Unix. It will list some of the common ways a hacker attacks a computer that is on the network and precautions that can be to minimize the risks of such attacks. It will describe the measures that will limit the damage in case of an attack or a compromised system. It will teach secure means of accessing the Internet from a Unix-based device, present an overview of hardening systems and address vulnerability issues. While being moderately technical, this lecture will still be within the grasp of a normal computer user doing day-to-day tasks on the Internet using a Unix-based device.
Kevin Sale is a CISSP accredited security professional with over 15 years security experience in the telecommunications, education, finance and energy sectors. His experience spans across all domains of Information Security; however at KAUST he is responsible for Information Security Governance, Risk and Compliance and project delivery.
Zulfikhar Ali Mohammed is an experienced systems’ analyst with emphasis on Unix security. He has over 18 years’ experience in the IT industry, ensuring optimal functionality of systems while maintaining security standards. At KAUST, he is responsible for making sure our mission-critical systems (processing salaries, budgets, HR, GASC requests, etc) are compliant with CIS-CAT benchmarks, which is an industry-wide security standards body. He also keeps a close eye on security risks and threats as they appear and takes actions to remediate and eliminate them.
No resources found.
No links found.