The Speed Of (In)Security: Analysis Of The Speed Of Security Vs. Insecurity

No ratings

Presented at Blackhat USA 2005 by

To be able to defend against IT security attacks, one has to understand the attack patterns and henceforth the vulnerabilities of the attached devices. But, for an in-depth risk analysis, pure technical knowledge of the properties of a vulnerability is not sufficient: one has to understand how vulnerabilities, exploitation, remediation, and distribution of information thereof is handled by the industry and the networking community.