Conveners
Protecting the EGI castle from thieves and marauders (Part 2)
- David Kelsey (STFC)
Description
Cyber attacks have become ubiquitous and attackers are targeting a wide range of services on the Internet. Resources involved in EGI are no exception and are constantly probed by attackers launching massive attacks that strive to find vulnerable machines anywhere. Successful attacks cause additional harm, including damage to the reputation of institutions and EGI.
This session is aimed at users of EGI resources, the research communities, and anyone charged with securing resources, services and virtual machines in the Cloud or Grid environment.
The attendees will be walked through a live scenario that shows basic offensives principles and techniques. Then, we will focus on how to provide proper response to incident.