{"id":1847,"date":"2023-10-06T15:55:16","date_gmt":"2023-10-06T12:55:16","guid":{"rendered":"https:\/\/eunis.org\/eunis2016\/?post_type=mec-events&#038;p=1847"},"modified":"2023-10-06T15:55:16","modified_gmt":"2023-10-06T12:55:16","slug":"parallel-session-two-ict-infrastructure-security","status":"publish","type":"mec-events","link":"https:\/\/eunis.org\/eunis2016\/events\/parallel-session-two-ict-infrastructure-security\/","title":{"rendered":"Parallel Session Two &#8211; ICT Infrastructure &#038; Security"},"content":{"rendered":"<p><strong>Asbj\u00f8rn Thorsen<\/strong>, <a href=\"http:\/\/eunis.org\/eunis2016\/wp-content\/uploads\/sites\/8\/2016\/02\/EUNIS2016_paper_38.pdf\">&#8220;Enter the mindset of a hacker. Why? Because to protect against hackers, you have to think as one!&#8221;<\/a>, <a href=\"http:\/\/eunis.org\/eunis2016\/wp-content\/uploads\/sites\/8\/2016\/02\/1-EUNIS-2016_paper38-presentation_ompressed.pdf\"><strong><span style=\"color: purple;\"> Presentation<\/span><\/strong> <\/a><\/p>\n<p><strong>Francesco Ciclosi, Maurizio Mauri and Alberto Polzonetti<\/strong>, <a href=\"http:\/\/eunis.org\/eunis2016\/wp-content\/uploads\/sites\/8\/2016\/02\/EUNIS2016_paper_39.pdf\">&#8220;UNIVERSITY ICT SECURITY CERTIFICATION&#8221;<\/a>, <a href=\"http:\/\/eunis.org\/eunis2016\/wp-content\/uploads\/sites\/8\/2016\/02\/2-EUNIS-2016_paper39-presentation.pdf\"><strong><span style=\"color: purple;\"> Presentation<\/span><\/strong> <\/a><\/p>\n<p><strong>Jos\u00e9 Bessa, Hugo Coelho, Pedro Monteiro, Jos\u00e9 Brito and Ant\u00f3nio Rio-Costa<\/strong>,\u00a0<a href=\"http:\/\/eunis.org\/eunis2016\/wp-content\/uploads\/sites\/8\/2016\/02\/EUNIS2016_paper_68.pdf\">&#8220;Using Honeypots in Network Intelligence Architectures \u2013 The University of Tr\u00e1s-os-Montes e Alto Douro case&#8221;<\/a>, <a href=\"http:\/\/eunis.org\/eunis2016\/wp-content\/uploads\/sites\/8\/2016\/02\/3-EUNIS-2016_paper68-presentation.pdf\"><strong><span style=\"color: purple;\"> Presentation<\/span><\/strong> <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Asbj\u00f8rn Thorsen, &#8220;Enter the mindset of a hacker. Why? Because to protect against hackers, you have to think as one!&#8221;, Presentation Francesco Ciclosi, Maurizio Mauri and Alberto Polzonetti, &#8220;UNIVERSITY ICT SECURITY CERTIFICATION&#8221;, Presentation Jos\u00e9 Bessa, Hugo Coelho, Pedro Monteiro, Jos\u00e9 Brito and Ant\u00f3nio Rio-Costa,\u00a0&#8220;Using Honeypots in Network Intelligence Architectures \u2013 The University of Tr\u00e1s-os-Montes e [&hellip;]<\/p>\n","protected":false},"author":233,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"mec_category":[48],"mec_speaker":[],"class_list":["post-1847","mec-events","type-mec-events","status-publish","hentry","mec_category-ict-infrastructure-security"],"_links":{"self":[{"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/mec-events\/1847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/users\/233"}],"replies":[{"embeddable":true,"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/comments?post=1847"}],"wp:attachment":[{"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/media?parent=1847"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/tags?post=1847"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/mec_category?post=1847"},{"taxonomy":"mec_speaker","embeddable":true,"href":"https:\/\/eunis.org\/eunis2016\/wp-json\/wp\/v2\/mec_speaker?post=1847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}