To Welcome Page
Workshops
Overview

Opening Plenary

Day View

Track View

Demonstrations and Activities


Welcome

Program

General Information

Registration

Call for Papers and Panels

Contacts

Home

NIST Home
Workshops Program
Thursday, October 8, 1998
1:30 - 6:00 p.m.
8:00 a.m. Registration
Pre-registration required - Cost: $120
Attendence limited
Regency Ballroom Foyer

Add to your conference experience by attending one of these outstanding technical workshops.

Workshop 1

Securing Your Place On The Web

  • Ken Cutler, MIS Training Institute/Information Security Institute

The World Wide Web (WWW) technology has been a major contributor to the exciting growth of the Internet. With the opportunity to globalize electronic commerce across the Web, in addition to having easy access to an attractive new vehicle for developing their own web of intranets for internal applications, many organizations are rushing to jump on the Web technology bandwagon. As with any new technology, the vast array of Web browsers, servers, and security protocols are still in their infancy which translates to many potential security pitfalls. In this up-to-the-minute workshop, we will:

  • Highlight the security and audit implications of important components of TCP/IP, Internet & Web technology
  • Identify the key security control points and related threats to your external and internal Internet/Web environment
  • Pinpoint serious security issues and important security countermeasures associated with Web application development software tools including: Java, ActiveX, JavaScript, CGI, SSI, "cookies," and robots
  • Build a shopping list for security features for selecting and configuring secure Web server (HTTP) software
  • Make sense of the myriad of new Web security protocols such as SET, SSL, S-HTTP, PCT, STLP, S-WAN, PPTP, IPsec, L2TP
  • Develop an end-to-end security plan by relating major Internet/Web security threats to a checklist of practical safeguards including: host security, firewalls, user authentication, and cryptography
  • Provide tips in selecting tools and techniques to organize an effective, on-going audit plan for evaluating the security of your Internet/Web environment.

Note: In addition to the session notes, participants in the workshop will receive a copy of the famous ISI Swiss Army Knife Security & Audit Reference, a glossary of distributed information systems terminology, and a Web Security and Audit Survival Kit.

Workshop 2

Common Criteria Protection Profile

  • Lynne Ambuel, BDM International
  • Murray Donaldson, CESG, UK

This workshop will provide information and instruction on using the Common Criteria to build protection profiles to express information technology security requirements. Community experience in building protection profiles will be used for this instruction. Alternative sets of related technologies will be compared and contrasted in the hope of harmonizing like requirements into generic protection profiles for given technologies (i.e. firewalls). In addition, issues arising from attempting to create protection profiles representing non-classic requirement sets will be discussed.

Workshop 3

How to Establish an Incident Handling Capability

  • Sandy Sparks, CIAC-Lawrence Livermore
  • Marianne Swanson, NIST

This workshop, which is sponsored by the Federal Computer Incident Response Capability (FedCIRC), will address many of the technical and administrative issues involved in establishing an incident handling capability. Topics to be covered include organizational structure, roles and responsibilities, technology platforms, incident handling methods, sample policy, reporting and issuing alerts, administrative and incident handling procedures, communications (users, other) and lessons learned.

Workshop 4

Connecting to the Internet

  • Tom Christian, CIAC - Lawrence Livermore National Laboratory

This workshop will address many of the technical issues involved in connecting to and managing systems and sites that are part of the Internet. Current threats on the Internet and how to work with incident response teams and obtain sources for more information will be explored. Administrative information such as the importance of setting up policies with management support will also be given. Topics to be covered include Internet threats, securing the system, detecting intrusions and security on the Internet.

Last update September 11, 1998

Workshops
Overview

Opening Plenary

Day View

Track View

Demonstrations and Activities


Welcome

Program

General Information

Registration

Call for Papers and Panels

Contacts

Home

NIST Home

Welcome | Program | General Information | Registration
Call for Papers and Panels | Contacts | Home | NIST Home