Case Study in Information Security

This paper outlines the steps taken to secure part of a network belonging to a telecommunications company that was compromised earlier this year. The material gives an overview of the incident handling procedure applied and the follow up vulnerability and risk assessments.
By Suzy Clarke
November 1, 2002

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg