Archiv:Security bei Kerzenschein: Unterschied zwischen den Versionen
MiKa (Diskussion | Beiträge) K (Added table headers, makes it easier to add/edit/swap/move events - Please leave it that way, thx!) |
Pepi (Diskussion | Beiträge) K (Pepi verschob die Seite Security bei Kerzenschein nach Archiv:Security bei Kerzenschein: No activity for 3 years) |
||
(24 dazwischenliegende Versionen von 8 Benutzern werden nicht angezeigt) | |||
Zeile 1: | Zeile 1: | ||
− | + | {{SbC}} | |
− | {| | + | <div style="display:none;"> |
− | | | + | <!-- Kompatibilitäts Lösung da ein verschateltes Template nicht von der Usergroups Auflistung erkannt wird, muss geupdated werden wenn sich das verschachtelte Usergroup Template auch ändert! --> |
+ | {{Usergroup | ||
+ | |logo=433081_candle_light_1.jpg | ||
+ | |organizer=[[Benutzer:Lynx|Lynx]], [[Benutzer:MiKa|MiKa]] | ||
+ | |email=https://lists.metalab.at/mailman/listinfo/sbc | ||
+ | |homepage=[[Security_bei_Kerzenschein]] | ||
+ | |irc= [irc://irc.freenode.net/metalab #metalab at irc.freenode.net] | ||
+ | |topic=All things pertinent to physical and IT-Security | ||
+ | |startdate=19.03.2007 | ||
+ | |status=active | ||
+ | |meetings=biweekly | ||
+ | |targetgroup=People interested in improving the security of all kinds. | ||
+ | |description=Yes, by candlelight. Really! | ||
+ | }} | ||
+ | </div> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Upcoming Meetings == | == Upcoming Meetings == | ||
− | {| | + | {| border="1" cellspacing="1" cellpadding="2" width="100%" style="border-collapse:collapse;" |
|width="25"| # ||width="280"| Date || Topic and Host(s) | |width="25"| # ||width="280"| Date || Topic and Host(s) | ||
|- | |- | ||
− | | # | + | | #16 || [[Security_by_Candlelight/CISSP/CBK_Review_02|2013-03-05 Tue 19:00]] || TBA |
+ | |- | ||
|} | |} | ||
− | |||
− | |||
== Next Meeting == | == Next Meeting == | ||
− | {| border="5" cellspacing=" | + | {| border="5" cellspacing="1" cellpadding="2" width="100%" style="border-collapse:collapse;" |
|width="25"| # ||width="280"| Date || Topic and Host(s) | |width="25"| # ||width="280"| Date || Topic and Host(s) | ||
|- | |- | ||
− | | # | + | | #15 || [[Security_by_Candlelight/SBC15_Crypto_Games|2013-02-19 Tue 19:00]] || '''Crypto Games on teh Interwebs: Challenges for no apparent reason'''<br>Recently a few Games/Challenges/Cryptic Messages appeared on several channels on the internet which are well-known for attracting all sorts of alternative netizens and dwellers of the deep web. While these challenges have no confirmed author or goal several groups and individuals are making large efforts to break these encrypted messages and solve the riddles. I would like to introduce two of them: "Cicada 3301" and "Charlie one Umbra" and try to reconstruct some of the methods used. |
− | |||
|- | |- | ||
|} | |} | ||
Zeile 62: | Zeile 37: | ||
== Past Meetings == | == Past Meetings == | ||
− | {| border="1" cellspacing=" | + | {| border="1" cellspacing="1" cellpadding="2" width="100%" style="border-collapse:collapse;" |
|width="25"| # ||width="280"| Date || Topic and Host(s) | |width="25"| # ||width="280"| Date || Topic and Host(s) | ||
+ | |- | ||
+ | | #14 || [[Security_by_Candlelight/CISSP/CBK_Review_01|2013-02-05 Tue 19:00]] || '''CISSP CBK:''' Definitions, Terms and Vocabulary | ||
+ | |- | ||
+ | | #13 || [[Security_by_Candlelight/CISSP/CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight: CISSP CBK Zero Day ''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br> | ||
+ | Hosted by [[User:MiKa|MiKa]]. Location: The Library. [[Security_by_Candlelight/CISSP|CISSP Portal]] | ||
+ | |- | ||
+ | | #12 || [[Security_bei_Kerzenschein/SBC12_IPv6_Security|2010-05-21 Fri 19:30]] || Security Mechanisms in IPv6: What's new, what' cool and what's annoying <br> | ||
+ | Hosted by [[Benutzer:Lynx|Lynx]] and [[User:MiKa|MiKa]] and [[User:naxx|naxxatoe]]. This time not in the library, because the library is taken. | ||
+ | |- | ||
+ | | #11 || [[ShmooCon2010|2010-02-05 Fri 09.00 PM - 2010-02-07 Sun 08.30 PM]] || SecBC Special: [[ShmooCon2010]]<br> | ||
+ | Unser außertourlicher 3-Tages-Marathon anlässlich der ShmooCon in Washington D.C. - mit live stream! | ||
|- | |- | ||
| #10 || [[Security_bei_Kerzenschein/SBC10_Advanced_Network_Security|2010-01-14 Thu 19:45 c.t.]] || Advanced Network Security<br> | | #10 || [[Security_bei_Kerzenschein/SBC10_Advanced_Network_Security|2010-01-14 Thu 19:45 c.t.]] || Advanced Network Security<br> | ||
Zeile 70: | Zeile 56: | ||
| #9 ||width="280"| [[Security_bei_Kerzenschein/SBC9_Plumbercon|2009-08-07 Fr 19:30]] || Security by Candlelight at [http://plumbercon.org/ PlumberCon]. Plumbercon is a security mini-con at the werkzeugH in the 5th district of Vienna. <br> | | #9 ||width="280"| [[Security_bei_Kerzenschein/SBC9_Plumbercon|2009-08-07 Fr 19:30]] || Security by Candlelight at [http://plumbercon.org/ PlumberCon]. Plumbercon is a security mini-con at the werkzeugH in the 5th district of Vienna. <br> | ||
Planned Topics: We would like to continue with our "Seven Layers of Insecurity" focusing on physical security, a topic which is often neglected when IT security is implemented.<br> | Planned Topics: We would like to continue with our "Seven Layers of Insecurity" focusing on physical security, a topic which is often neglected when IT security is implemented.<br> | ||
− | + | ||
|- | |- | ||
| #8 || [[Security_bei_Kerzenschein/SBC8_What's_the_Risk|2009-07-23 Thu 19:30]] || We were able to schedule another "Security by Candlelight" before the the [http://plumbercon.org/ PlumberCon]. This time we have the following topics: Security Management and Risk Management. Now that we know about our possible enemies we will go the next step and evaluate how security breaches can affect information systems and which steps are apropriate to "mitigate" (dt.: abschwächen, mildern) any risks. Doing too much is expensive, doing too little is dangerous - finding the right balance is an art (and a science).<br> | | #8 || [[Security_bei_Kerzenschein/SBC8_What's_the_Risk|2009-07-23 Thu 19:30]] || We were able to schedule another "Security by Candlelight" before the the [http://plumbercon.org/ PlumberCon]. This time we have the following topics: Security Management and Risk Management. Now that we know about our possible enemies we will go the next step and evaluate how security breaches can affect information systems and which steps are apropriate to "mitigate" (dt.: abschwächen, mildern) any risks. Doing too much is expensive, doing too little is dangerous - finding the right balance is an art (and a science).<br> | ||
Zeile 105: | Zeile 91: | ||
After SBC is before SBC | After SBC is before SBC | ||
− | [[Kategorie: | + | |
+ | |||
+ | |||
+ | |||
+ | |||
+ | __NOTOC__ | ||
+ | |||
+ | [[Kategorie:English]] | ||
+ | [[Kategorie:Interessensgebiete]] | ||
[[Kategorie:Veranstaltungen]] | [[Kategorie:Veranstaltungen]] | ||
− | [[Kategorie: | + | [[Kategorie:Usergroups]] |
− | |||
− |
Aktuelle Version vom 19. Oktober 2016, 15:10 Uhr
Security by Candlelight
|
Security sometimes seems like a hard and long journey But properly equipped it will be just like snapping with your fingers. I'm afraid we will not have a "Babylon Candle" to get us there but at least it will be much more fun to travel in a group and talk about the things and wonders we see along the road. A Meeting Place for Security Enthusiasts at the Metalab in Vienna
Location: The "library" at the Metalab in Vienna: Map Twitter: @MetaLabSbC |
Upcoming Meetings
# | Date | Topic and Host(s) |
#16 | 2013-03-05 Tue 19:00 | TBA |
Next Meeting
# | Date | Topic and Host(s) |
#15 | 2013-02-19 Tue 19:00 | Crypto Games on teh Interwebs: Challenges for no apparent reason Recently a few Games/Challenges/Cryptic Messages appeared on several channels on the internet which are well-known for attracting all sorts of alternative netizens and dwellers of the deep web. While these challenges have no confirmed author or goal several groups and individuals are making large efforts to break these encrypted messages and solve the riddles. I would like to introduce two of them: "Cicada 3301" and "Charlie one Umbra" and try to reconstruct some of the methods used. |
Past Meetings
# | Date | Topic and Host(s) |
#14 | 2013-02-05 Tue 19:00 | CISSP CBK: Definitions, Terms and Vocabulary |
#13 | 2013-01-22 Tue 19:00 | Revival of Security by Candlelight: CISSP CBK Zero Day Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang Hosted by MiKa. Location: The Library. CISSP Portal |
#12 | 2010-05-21 Fri 19:30 | Security Mechanisms in IPv6: What's new, what' cool and what's annoying Hosted by Lynx and MiKa and naxxatoe. This time not in the library, because the library is taken. |
#11 | 2010-02-05 Fri 09.00 PM - 2010-02-07 Sun 08.30 PM | SecBC Special: ShmooCon2010 Unser außertourlicher 3-Tages-Marathon anlässlich der ShmooCon in Washington D.C. - mit live stream! |
#10 | 2010-01-14 Thu 19:45 c.t. | Advanced Network Security Hosted by Daniel Mende (ERNW Heidelberg) |
#9 | 2009-08-07 Fr 19:30 | Security by Candlelight at PlumberCon. Plumbercon is a security mini-con at the werkzeugH in the 5th district of Vienna. Planned Topics: We would like to continue with our "Seven Layers of Insecurity" focusing on physical security, a topic which is often neglected when IT security is implemented. |
#8 | 2009-07-23 Thu 19:30 | We were able to schedule another "Security by Candlelight" before the the PlumberCon. This time we have the following topics: Security Management and Risk Management. Now that we know about our possible enemies we will go the next step and evaluate how security breaches can affect information systems and which steps are apropriate to "mitigate" (dt.: abschwächen, mildern) any risks. Doing too much is expensive, doing too little is dangerous - finding the right balance is an art (and a science). Hosted again by: Lynx, Naxx and MiKa (as planned, changes possible). |
#7 | 2009-07-01 Mi 19:30 | Resurrection of Security by Candlelight: Meet, get to know each other and open discussion with Lynx, Naxx und MiKa. We will present a little introduction to security based on our "Seven Layers of Insecurity" workshop, presented at the DeepSec 2007 Conference in Vienna and then hope to start to get a little interactive. |
#6 | 2008-04-01 Tue 19:30 | Self-Spreading_Linux_Malware |
#5 | 2007-08-16 Thu 19:30 |
|
#4 | 2007-05-07 Mon 19:30 | Consti: Vienna City Terminals |
#3 | 2007-04-16 Mon 19:30 | |
#2 | 2007-04-02 Mon 19:30 | Philip: tcpdump for beginners ;) |
#1 | 2007-03-19 Mon 19:30 |
Norman Bates' Mother: No! I tell you no! I won't have you bringing some young girl in for supper! -- Psycho (1960 film)
|
And What's after Security by Candlelight?
After SBC is before SBC