copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

Presentations and Papers




Further Information
Anonymously Launching a DDoS Attack via the Gnutella Network - (01/06/2002)

Information Security Standards - This page provides a range of information about standards directly or peripherally associated with information security within Australia New Zealand, and elsewhere throughout the world. It does not set out to exhaustively list all standards in the known universe that may relate primarily or peripherally to information security. (27/05/2002)

Collecting Electronic Evidence After a System Compromise - Collecting forensic evidence for the purposes of investigation and/or prosecution is difficult at the best of times, but when that evidence is electronic an investigator faces extra complexities.... (02/08/2001)

Lessons Learned from Loving Melissa - Between April 1999 and May 2000 a series of events relating to computer security received blanket worldwide coverage. (05/07/2000)

Distributed Denial of Service Attacks - Recent media coverage has focused on a series of Distributed Denial of Service (DDOS) attacks against a number of high profile sites. In general, these sites have been E-Commerce related. Previous years have seen concentrated Denial of Service (DOS) attacks against other industry groups, particularly ISPs, universities and other agencies throughout the world. (16/02/2000)

Copyright Amendment (Digital Agenda) Bill 1999 Submissions - Submissions on the Exposure Draft of the Copyright Amendment (Digital Agenda) Bill 1999 and Commentary in pdf format. (19/03/1999)

Improving Computer Security through Network Design - Security conscious organisations have learned the benefits of protecting their information processing infrastructure from unauthorised actions by intruders. Unfortunately, many organisations leave key systems open to attack due to poor network design. (01/06/1997)

Enhancing Security of Unix Systems - This paper examines the common threats to data security in open systems highlighting some of the more recent threats, and looks at some of the tools and techniques that are currently available to enhance the security of a Unix system. (01/01/1996)

Forming an Incident Response Team - This paper examines the role an IRT may play in the community, and the issues that should be addressed both during the formation and after commencement of operations. (01/01/1995)

Surfing Between the Flags: Security on the Web - This paper examines internet security with respect to the WWW. (01/01/1995)

Selected Aspects of Computer Security in Open Systems - This report examines those security threats, and details what tools and techniques are available to combat them. (08/11/1993)

Operational Security - Occurrences and Defence - This paper is a discussion of computer security. Rather than detailing the standard weaknesses in computer security (which have been detailed many times in the past), this paper discusses a few recent vulnerabilities and details of where further information on computer security can be found. (01/06/1993)

Site Security Policy Development - In order to ensure that computer systems are used in an effective and productive way, it is important that the owners, operators and users of these systems have a clear understanding of acceptable standards of use. Such an understanding can be gained as part of a Site Computer Security Policy. (01/01/1993)

A Practical Exercise in Securing an OpenVMS System - (01/01/1993)


Previous  1, 2 denotes AusCERT member only content.