Академический Документы
Профессиональный Документы
Культура Документы
Not here to
familia r with
the
threat
vectors!!!
How many of you have FEW or ALL of these in your LAPTOPS and HDDs thru TORRENTZ ?
How many of
you have LINUX in your
Workstation s?
How many of
you have
Windows in
your
Workstation s?
Collusion is an experimental addon for Firefox and allows you to see all the third parties that are tracking your movements across the Web. It will show, in real time, how that data creates a spider-web of interaction
between companies and other trackers.
UNWANTED
APPS
Friends List Their Phone Numbers Their Addresses Your SMS Your MMS Your Browsing History Your Chats Your relatives details Your preferences
Does it Matter ?
locations, the applications they were running and the types of devices they were using were known variables.
servers in the
The IT
organization controlled access to those applications and established boundaries to enforce security policies
TOUCHING MOMENT
HAPPY CISO!!!!!!
IT no
BOTNETS
Attack Surface
CRIMEWARE as a SERVICE
access to India's telecommunications network and the ability to listen in on & record mobile landline and satellite calls and ) , and read
private emails, SMS and MMS and track the geographical location of individuals, all
in real time.
Operation B70
It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form to allow them to gain access to the data held within your database. Refers to a hacking technique that leverages vulnerabilities in the code of a web application to allow an attacker to send malicious content from an enduser and collect some type of
Browser Exploits
A form of malicious code that takes advantage of a flaw or vulnerability in an operating system or piece of software with the intent to breach browser security to alter a user's browser settings without their knowledge
Domains of security
Sadly.till date the approach has been mostly Who decides the have Security QRs.????? reactive since we been traditional in configuring SECURITY!!!!!!!
WHAT DO WE DO TODAY?
NO TWO ORG or USERS CAN HAVE SAME MODEL OF SECURITY IMPLEMENTATION THE NEED IS CUSTOMISED FOR EVERYONE
MODEL
KEEP YOUR
EYES/EARS OPEN
Cryptography OpenSource
Updates
Monitoring tools Strong Passwords Live DVDs Secure Design Common Passwords Cookies
Stringent Hardening
Access Controls Analysis tools
Cyber Hygiene
IT IQ
False Identity
Insider Attack
Threats
Breach of Anonymity
Unauth Disclosure
TIME TRAVELLING ROBOTS FROM THE FUTURE Face recognition starts getting perfect
Speech recognition starts getting perfect Speaker recognition starts getting perfect We dont have a good AI today But we are improving on AI by day We have cheap storage We are recording what goes on.
E-Mail : anupamtiwari@fedoraproject.org