Intranet Security and the Big Picture
Linda McCarthy - Sun Microsystems
Jan 17, 1997
AbstractLinda McCarthy has broken into thousands of systems on corporate intranets. As detailed in her upcoming book, Intranet Security: Stories from the Trenches, her exploits could have easily shut down executive networks, killed manufacturing processes, and even crashed world-wide computer operations. When auditing, Linda focuses her skills on teaching executive managers how to avoid those types of disasters instead.
In this presentation, Linda tells us why security policies are the foundation for security. She also explains why security policies are a nightmare and why most executives just don't get the big picture. After describing these problems, Linda presents workable solutions and explains why NOW is the best time in history for computer security.
About the SpeakerLinda McCarthy has worked with UNIX for over a decade, focusing primarily on security administration, hardware architecure, product develoment, and key-management (encryption) technology. She has performed security testing on corporate networks and has regularly provided her consultive services to executive managers to help them understand the level-of-risk on their networks.
Linda has held several teaching positions at Sun Microsystems, where she has taught courses in hardware architecture, system administration, and Unix security. She currently leads a world-wide security research and development team at Sun.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.