Presented at
DEF CON 9 (2001),
July 13, 2001, 10 a.m.
(50 minutes).
This presentation describes how we did the country-wide web server security evaluation in 1999 and 2001. It covers methodology and results. Also, we compared the difference between these 2 surveys, make some conclusion on current status and advisories to the government. Vulnerable web servers by type and percentages as well as trends are covered.
Presenters:
-
Chieh Chun Lin
Biing Jong Lin I established TW-CERT (Country CERT in Taiwan) and worked there from 1997 to 2000. Now he works in the Science and Technology Infomation Center in National Science Council. Biing John Lin is also a consultant of nCERT, a government sponsored CERT after the cyberwar between China and USA in May, 2001 began.
Co-author is Chieh Chun Lin and Chan Che Su. They work at Internet Security Solutions, Intl in Taiwan. They are senior security experts and consultants, specialized in security assessment and penetration.
-
Jan Che Su
Biing Jong Lin I established TW-CERT (Country CERT in Taiwan) and worked there from 1997 to 2000. Now he works in the Science and Technology Infomation Center in National Science Council. Biing John Lin is also a consultant of nCERT, a government sponsored CERT after the cyberwar between China and USA in May, 2001 began.
Co-author is Chieh Chun Lin and Chan Che Su. They work at Internet Security Solutions, Intl in Taiwan. They are senior security experts and consultants, specialized in security assessment and penetration.
-
Biing Jong Lin
Biing Jong Lin I established TW-CERT (Country CERT in Taiwan) and worked there from 1997 to 2000. Now he works in the Science and Technology Infomation Center in National Science Council. Biing John Lin is also a consultant of nCERT, a government sponsored CERT after the cyberwar between China and USA in May, 2001 began.
Co-author is Chieh Chun Lin and Chan Che Su. They work at Internet Security Solutions, Intl in Taiwan. They are senior security experts and consultants, specialized in security assessment and penetration.
Links:
Similar Presentations: