Barbaros Catkan

Presentation Title: Packet Filtering Firewalls at the Network Perimeter
Presentation Details:

In this article, we will discuss packet filtering firewalls and how they are positioned in a Defense-In-Depth concept. We will introduce some basic guidelines for configuration to provide security against some types of attacks. Although we will concentrate on network security, we will also examine the possibilities of implementing PF firewalls in host security.

About Barbaros:

Barbaros Catkan. Presently a lecturer at the Kingdom University. Started his career as a systems programmer on IBM mainframes in early 1980s after graduating from the university. Worked up from technical to managerial positions in Information Management Departments and hence witnessed the change in the IT industry from centralistic mainframe environments to today’s distributed environments. Can be reached at b.catkan@ku.edu.bh

Posted by Administrator @ 2004-12-09 11:14 am
CFP now open

The Call for Papers for HITBSecConf2005 - Bahrain is now open. Please ensure all your paper submissions reach us before March 1st 2005. For further details, please take a look at the CFP Page.

Posted by Administrator @ 2004-12-01 7:07 pm
Call for Papers - CFP

SUBMISSION

Talks that are more technical or that discuss new and never before seen attack methods are of more interest than a subject that has been covered several times before. We are striving to create a deep-knowledge technical conference and any presentation that helps achieve this will most likely be selected.

Summaries not exceeding 250 words should be submitted (in plain text format) to cfp -at- hackinthebox.org for review and possible inclusion in the program.
Submissions are due no later than March 1st, 2005.

TOPICS

Topics of interest include, but are not limited to the following:

· Analysis of network and security vulnerabilities
· Firewall technologies
· Intrusion detection / prevention
· Data Recovery and Incident Response
· GPRS and CDMA Security
· Identification and Entity Authentication
· Network Protocol and Analysis
· Smart Card Security
· Virus and Worms
· WLAN and Bluetooth Security.
· Analysis of malicious code
· Applications of cryptographic techniques
· Analysis of attacks against networks and machines
· Denial-of-service attacks and countermeasures
· File system security
· Security in heterogeneous and large-scale environments
· Espionage and Counter Intelligence
· Techniques for developing secure systems
· Military Security / Technology

PLEASE NOTE:

We do not accept product or vendor related pitches. If your talk involves an advertisement for a new product or service your company is offering, please do not submit.

TIMING

Generally, talks will range from (a minimum) 60 to 90 minutes in length. It is expected the speaker will budget time for audience participation and a Q&A session.

REMUNERATION

All flights and hotel accomodation will be provided should your paper be accepted for presentation.

Posted by Administrator @ 2004-12-01 7:02 pm

Event Organizers


E-Security Gulf Group  


Hack In The Box (M) Sdn. Bhd.  



Sponsors


Microsoft Corporation  


Argus Systems Group 


Bahrain International Circuit 


Gulf Air 


Kingdom University, Bahrain 


Instec Digital Systems 


Oracle Corporation 


SIAG 


Duroob Technology 


Qatar Airways 



Supporting Organizations


Bellua Asia Pacific  


X-Focus China  


Bahrain Information Technology Society 

Hack In The Box (M) Sdn. Bhd.