Search Engine based Data Leakage
|
|
- Homer Edwards
- 6 years ago
- Views:
Transcription
1 Search Engine based Data Leakage Dipl.-Inf. Hans Pongratz Technische Universität München 4th ETSI Security Workshop January 2009 ETSI, Sophia Antipolis, France
2 Threats to Sensitive Data Employee errors (unintentional) Data stolen by business partner or insider Sabotage Outsider threats - malware, spyware or hackers Sensitive data (e.g.): employee personal data, costumer data, internal documents, R&D, accounting, 2
3 Data Leakage Issues Through Search Engines Axel Springer (Sep 2008) personal data including bank account details of classified ad customers were indexed by search engines. Universität Magdeburg (May 2008) database with personal data of students was indexed by google for 10 days. Astroglid (Apr 2007) list of over customers was exposed via web and indexed by google. 3
4 Search Engines Tasks of a search engine generation and maintenance of search index, processing of search queries, presentation of results. Bot / Crawler WWW Search Engine Index generation: manually automatically Request Result(s) 13th January 2009 Hans Pongratz, TUM, pongratz@tum.de 4
5 Which information are indexed? Most search engines mine web pages images files Some search engines even mine databases social networks news open directories 5
6 Google Search Basics 1 Operator Description + Adds words to search query, even those which google normally ignores, like the - Exclude words or arguments from search ETSI Workshop ~car Searchs the exact phrase Looks for car and its synonyms * wildcard, to match one or more words in search or-operator cache: site: cache:url will not display the current version of the page, but Google s cached version. site:url will only search within specific website or domain. 6
7 Google Search Basics 2 Operator intext: intitle: allintitle: inurl: filetype: daterange: numrange: Results will be restricted to those containing query term in the text query term in the title all query terms in the title given word in the URL particular file format, e.g..pdf,.xls or.doc data, which has been created or modified in specified timeslot. numbers in specified range 7
8 Google Hacking Acronym for the use of search engines to find attack vectors, privacy or security issues via search queries. Examples for information that can be searched: server vulnerabilities log files error messages with too much information passwords stores directories 8
9 Example Queries Search Object internal docs price lists confidential pricelists web cams Apache error Search Query "internal use only" site:yoursite.xyz (pricelist "price list") site:yoursite.xyz (confidential "internal use only") ("price list" pricelist) site:yoursite.xyz intitle:"active webcam page" site:yoursite.xyz intitle: apache tomcat" error report" site:yoursite.xyz More Google Hacking clues and queries 9
10 Some examples on relationships between search engines Try more than one search engine! 10
11 Defacement Found on google.de 11
12 Remote Shell Found on google.de 12
13 Countermeasures Don t put sensitive data on your web server! Check your web servers on a regular basis for threats! Consider using robots.txt with meta-tags (noarchive) What to do in case? Google: Yahoo: help.yahoo.com/l/us/yahoo/search/siteexplorer/delete/index.html Live Search: support.live.com/eform.aspx?productkey=wlsearchcontentremoval Check other search engines and their caches, too! 13
14 Pen-Tests Guidelines ISECOM: Open-Source Security Testing Methodology Manual NIST: Guideline on Network Security Testing BSI: Studie Durchführungskonzept für Penetrationstests OWASP: Open Web Application Security Project Testing Guide Security Standards ISO/IEC 27001/27002 BSI Grundschutz NIST 14
15 Thank you for your attention! 15
Google Hacking. Information Security Summit Cleveland, Ohio. Pete Garvin.
Google Hacking Information Security Summit Cleveland, Ohio Pete Garvin pgarvin@protectus.com October 2005 Google Hacking Overview A few words about Google What is Google Hacking? Why it s relevant How-to
More informationOntology- and Bayesian- based Information Security Risk Management
Ontology- and Bayesian- based Information Security Risk Management Stefan Fenz sfenz@securit 4 th ETSI Security Workshop 13 14 January 2009 ETSI, Sophia Antipolis, France Motivation Almost every business
More informationCollecting information
Mag. iur. Dr. techn. Michael Sonntag Collecting information E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology
More informationGOOGLE - SECURITY TESTING TOOL. Georgi Staykov
International Journal "Information Technologies and Knowledge" Vol.1 / 2007 359 GOOGLE - SECURITY TESTING TOOL Georgi Staykov Abstract: Using Google as a security testing tool, basic and advanced search
More informationThis query searches for the word "snowmobile" or phrase "Green Bay" along with the word "snowblower."
Google Hacking 101 Google Search Basics Google being a full-text search engine, it indexes entire web pages instead of just titles and descriptions. This allows comprehensive searches based upon key (query)
More informationGoogle Hacking (Kind of) and Other Cool Searches
Google Hacking (Kind of) and Other Cool Searches But first a warning GRAMMAR MATTERS Agenda Google Introduction Features and Magic (Maybe) Google Search Technique Google Basic Operators Google Advanced
More informationInstructor: Kathleen Scheaffer Content: Adopted from Gwen Harris
WEB SEARCHING Instructor: Kathleen Scheaffer Content: Adopted from Gwen Harris http://plc.fis.utoronto.ca/courses/gharris/fis/workshop/ - unless otherwise noted Agenda Introduction Definition of Search
More informationHow can I become a super cool open source wiz?
How can I become a super cool open source wiz? Google: I m Feeling Lucky Common Google Booleans NOT.this not that AND.this and that OR.this or that Narrows search term -searchterm +searchterm ~searchterm
More informationAn Agency Under MOSTI SECURITY ASSURANCE. Securing Our Cyberspace. Copyright 2008 CyberSecurity Malaysia
An Agency Under MOSTI Understanding Mobile Phone Threat Vectors 4 th th ETSI Mobile Security Workshop Sophia Antipolis, France SECURITY ASSURANCE Creating Trust & Confidence Mohamad Nizam Kassim, GAWN
More informationHacking Demonstration. Dr John McCarthy Ph.D. BSc (Hons) MBCS
Hacking Demonstration Dr John McCarthy Ph.D. BSc (Hons) MBCS Demonstration Deploying effective cyber security is one of the 21 st century s greatest challenges for business. The threats facing businesses
More informationSearch Like a Pro. How Search Engines Work. Comparison Search Engine. Comparison Search Engine. How Search Engines Work
Search Like a Pro Nancy Warren AkLA Conference 2010 How Search Engines Work http://computer.howstuffworks.com/search-engine1.htm Google How Search Engines Crawl a Web Site Yahoo Comparison Search Engine
More informationSECURITY TESTING. Towards a safer web world
SECURITY TESTING Towards a safer web world AGENDA 1. 3 W S OF SECURITY TESTING 2. SECURITY TESTING CONCEPTS 3. SECURITY TESTING TYPES 4. TOP 10 SECURITY RISKS ate: 2013-14 Few Security Breaches September
More informationSearching. Outline. Copyright 2006 Haim Levkowitz. Copyright 2006 Haim Levkowitz
Searching 1 Outline Goals and Objectives Topic Headlines Introduction Directories Open Directory Project Search Engines Metasearch Engines Search techniques Intelligent Agents Invisible Web Summary 2 1
More informationTable of contents. 1. Backlink Audit Summary...3. Marketer s Center. 2. Site Auditor Summary Social Audit Summary...9
EXECUTIVE SUMMARIES Table of contents Marketer s Center 1. Backlink Audit Summary...3 Top Referring TLDs...3 Anchor Text Cloud...3 Anchor Text Phrases...3 Offpage Competitive Comparison...4 Referring Domains...4
More informationGoogle Search Operators
Google Search Operators The following table lists the search operators that work with each Google search service. Click on an operator to jump to its description or, to read about all of the operators,
More informationBasics of executing a penetration test
Basics of executing a penetration test 25.04.2013, WrUT BAITSE guest lecture Bernhards Blumbergs, CERT.LV Outline Reconnaissance and footprinting Scanning and enumeration System exploitation Outline Reconnaisance
More informationTHREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda
THREAT MODELING IN SOCIAL NETWORKS Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda INTRODUCTION Social Networks popular web service. 62% adults worldwide use social media 65% of world top companies
More informationGOOGLE HACKING!! Date : 10/31/2007. Krishna Prasad Yerrapragada
GOOGLE HACKING!! Date : 10/31/2007 Krishna Prasad Yerrapragada Introduction AGENDA What is Google Hacking/GHDB? GHDB Johnny Long How it works? Possible Reasons Approaches to AVOID/RESOLVE Google s Response
More informationProvide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any
OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing
More informationYou got a website. Now what?
You got a website I got a website! Now what? Adriana Kuehnel Nov.2017 The majority of the traffic to your website will come through a search engine. Need to know: Best practices so ensure your information
More informationdeseo: Combating Search-Result Poisoning Yu USF
deseo: Combating Search-Result Poisoning Yu Jin @MSCS USF Your Google is not SAFE! SEO Poisoning - A new way to spread malware! Why choose SE? 22.4% of Google searches in the top 100 results > 50% for
More informationSOCIAL NETWORKING IN TODAY S BUSINESS WORLD
SOCIAL NETWORKING IN TODAY S BUSINESS WORLD AGENDA Review the use of social networking applications within the business environment Review current trends in threats, attacks and incidents Understand how
More informationIntroduction. What do you know about web in general and web-searching in specific?
WEB SEARCHING Introduction What do you know about web in general and web-searching in specific? Web World Wide Web (or WWW, It is called a web because the interconnections between documents resemble a
More informationCh 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated
Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture
More informationAURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo
ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking
More informationSecurity Mutation Algorithm for Google Print and Google s Search Security Deficiency
Security Mutation Algorithm for Google Print and Google s Search Security Deficiency Amar Akshat Abstract. The research work prove the fact that Google installs its cookie into the user s system for more
More informationDo you handle student data?
Technical University of Munich Do you handle student data? Then think about data protection! To organize the university s degree programs, TUM offers the campus management system TUMonline and the e-learning
More informationWeb insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.
Web Security Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming Web Security Slide 1/25 Outline Web insecurity Security strategies General security Listing of server-side risks Language
More informationSearching the Web for Information
Search Xin Liu Searching the Web for Information How a Search Engine Works Basic parts: 1. Crawler: Visits sites on the Internet, discovering Web pages 2. Indexer: building an index to the Web's content
More informationDeep Web. CSF: Forensics Cyber-Security. Part II.B. Techniques and Tools: Network Forensics. Fall 2015 Nuno Santos
Deep Web Part II.B. Techniques and Tools: Network Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary } The Surface Web } The Deep Web 2 Remember were we are } Our journey in this course:
More informationMOBILE THREAT LANDSCAPE. February 2018
MOBILE THREAT LANDSCAPE February 2018 WHERE DO MOBILE THREATS COME FROM? In 2017, mobile applications have been a target of choice for hackers to access and steal data, with 86% of mobile threats coming
More informationMobile Malfeasance. Exploring Dangerous Mobile Code. Jason Haddix, Director of Penetration Testing
Mobile Malfeasance Exploring Dangerous Mobile Code Jason Haddix, Director of Penetration Testing Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationTen Tips for Smarter Google Searches Date: Dec 1, 2006 By Michael Miller. Article is provided courtesy of Que.
Page 1 of 5 Ten Tips for Smarter Google Searches Date: Dec 1, 2006 By Michael Miller. Article is provided courtesy of Que. Most people use Google in a very inefficient and often ineffective manner. If
More informationQuick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile
More informationGerman OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer
German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer
More informationHow NOT To Get Hacked
How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?
More informationGoogle Search Appliance
Google Search Appliance Getting the Most from Your Google Search Appliance Google Search Appliance software version 7.4 Google, Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 www.google.com GSA-QS_200.03
More informationSearch With Better Results. by Hewie Poplock
Search With Better Results by Hewie Poplock The Google Search Page What is a Search Engine? A search engine is a web site connected to a database that catalogs other Web sites. It will search the actual
More informationSEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail.
SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client
More informationRestech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS
Restech User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS Your presenter: Vince Gremillion, CISSP 30+ years technical and customer service experience Founder/Co-Owner RESTECH
More information5 IT security hot topics How safe are you?
5 IT security hot topics How safe are you? Why this whitepaper? We meet many people in IT, of various levels of experience and fields of work. This whitepaper is written for everybody who wants to read
More informationSEO Search Engine Optimization ~ Certificate ~
SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client
More informationDigital Marketing for Small Businesses. Amandine - The Marketing Cookie
Digital Marketing for Small Businesses Amandine - The Marketing Cookie Search Engine Optimisation What is SEO? SEO stands for Search Engine Optimisation. Definition: SEO is a methodology of strategies,
More informationSEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail.
SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client
More informationNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING LESS The Threat State Sponsored MORE Terrorism Espionage Criminal NOTE: Hackers increasingly showing more potential to cause greater damage MORE Hacker LESS Occurrence Damage
More informationOur sponsors Zequi V Autopsy of Vulnerabilities
Our sponsors Our sponsors Our sponsors About me Who s me? Ezequiel Zequi Vázquez Backend Developer Sysadmin & DevOps Hacking & Security Speaker since 2013 About me Index 1 Introduction 2 Analysis of Vulnerabilities
More informationWeb Application Security. Philippe Bogaerts
Web Application Security Philippe Bogaerts OWASP TOP 10 3 Aim of the OWASP Top 10 educate developers, designers, architects and organizations about the consequences of the most common web application security
More informationMIS5206-Section Protecting Information Assets-Exam 1
Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationSite Auditor Summary. Total Issues: 95 (Change: 87%) 7 Pages Crawled - June 18, Content Issues 2 0% 3 0%
Total : 95 (Change: 87%) 7 Pages Crawled - June 18, 13 Visibility META Content Link Image Semantic % 4 3% % 3 % 86 83% % Visibility pages were blocked by robots.txt A robots.txt file permits or restricts
More informationDomain
SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client
More informationAN OVERVIEW OF SEARCHING AND DISCOVERING WEB BASED INFORMATION RESOURCES
Journal of Defense Resources Management No. 1 (1) / 2010 AN OVERVIEW OF SEARCHING AND DISCOVERING Cezar VASILESCU Regional Department of Defense Resources Management Studies Abstract: The Internet becomes
More informationSide Channel Vulnerabilities on the Web - Detection and Prevention. OWASP Education Project. The OWASP Foundation
Side Channel Vulnerabilities on the Web - Detection and Prevention OWASP Education Project Sebastian Schinzel Virtual Forge GmbH University of Mannheim sebastian.schinzel@virtualforge.de Copyright 2007
More informationApplication Security & Verification Requirements
Application Security & Verification Requirements David Jones July 2014 This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contains content Copyright 2008 2013 The
More informationFootprinting. Chapter 4
Footprinting Chapter 4 Losing Control of Information Business loss Information leakage Privacy loss Corporate espionage What Is Footprinting? The process of researching and uncovering details about your
More informationGSMA Security Group Update
GSMA Security Group Update James Moran jmoran@gsm.org 2 nd ETSI Security Workshop: Future Security 16-17 January 2007 Sophia Antipolis, France GSM ASSOCIATION OVERVIEW World s largest and leading celluar
More informationNIS Platform Working Group 3 Individuals Digital Rights and Capabilities. Dr. Gisela Meister April
NIS Platform Working Group 3 Individuals Digital Rights and Capabilities Dr. Gisela Meister April 08-2014 AoI 1: Individuals Digital Rights and Capabilities AoI 1 s vision is that individuals needs and
More informationAn analysis of security in a web application development process
An analysis of security in a web application development process Florent Gontharet Ethical Hacking University of Abertay Dundee MSc Ethical Hacking 2015 Table of Contents Abstract...2 Introduction...3
More informationExploring Advanced Search Features on the web
Exploring Advanced Search Features on the web Doc 9.82 Ver 1 Netskills original material adapted by October 2005 Central Computing Services Prerequisites This document assumes that you are familiar with
More informationSEO Search Engine Optimization ~ Certificate ~
SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client
More informationCISO View: Top 4 Major Imperatives for Enterprise Defense
CISO View: Top 4 Major Imperatives for Enterprise Defense James Christiansen Chief Information Security Officer Evantix, Inc. Gary Terrell CIPP Chief Information Security Officer Adobe Session ID: Star
More informationCybersecurity for Health Care Providers
Cybersecurity for Health Care Providers Montgomery County Medical Society Provider Meeting February 28, 2017 T h e MARYLAND HEALTH CARE COMMISSION Overview Cybersecurity defined Cyber-Threats Today Impact
More informationSearch With Better Results
Search With Better Results by Hewie Poplock info@hewie.net https://hewie.net http://cb4s.net Wednesday, March 14, 2018 The Google Search Page What is a Search Engine? A search engine is a web site connected
More information10 Cybersecurity Questions for Bank CEOs and the Board of Directors
4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors
More informationName: MDM 4U1 Date: Does the research measure what it is supposed to measuring?
2.4 Reporting on Data In this section, we will be finding and reporting on data. Before we do that though we should have a good idea about where to find data and whether we should use it or not. A. Finding
More informationAffiliateBeginnersGuide.com
1 of 5 AffiliateBeginnersGuide.com Web site catalog - links to guides RSS Feed: http://www.affiliatebeginnersguide.com/affbgfeed.rss Main page http://www.affiliatebeginnersguide.com/ Main page Affiliate
More informationEffective Strategies for Managing Cybersecurity Risks
October 6, 2015 Effective Strategies for Managing Cybersecurity Risks Larry Hessney, CISA, PCI QSA, CIA 1 Everybody s Doing It! 2 Top 10 Cybersecurity Risks Storing, Processing or Transmitting Sensitive
More informationCPTE: Certified Penetration Testing Engineer
www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification
More informationAdvanced Digital Marketing Course
Page 1 Advanced Digital Marketing Course Launch your successful career in Digital Marketing Page 2 Table of Contents 1. About Varistor. 4 2. About this Course. 5 3. Course Fee 19 4. Batches 19 5. Syllabus
More informationIT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT
IT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT M. BAUN, R. BROSCHE, A. KASTENMÜLLER Technische Universität München, Forschungsneutronenquelle Heinz
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationSearch Engine Technology. Mansooreh Jalalyazdi
Search Engine Technology Mansooreh Jalalyazdi 1 2 Search Engines. Search engines are programs viewers use to find information they seek by typing in keywords. A list is provided by the Search engine or
More informationImportant Information
Important Information This presentation was created by Patrick Crispen. You are free to reuse this presentation provided that you Not make any money from this presentation. Give credit where credit is
More informationSEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail.
SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client
More informationshwedirectory v4.0 Php Web & Business Directory Script Top 12 Features of shwedirectory Premium Edition
shwedirectory v4.0 Php Web & Business Directory Script Top 12 Features of shwedirectory Premium Edition 1. Admin Subdomain 2. Content Security Policy (CSP) Header 3. Subdomain for each city and country
More informationSecurity Challenges in Smart Distribution
Security Challenges in Smart Distribution Thomas Bleier Dipl.-Ing. MSc zpm CISSP CEH CISM Thematic Coordinator ICT Security Safety & Security Department AIT Austrian Institute of Technology GmbH Smart
More informationName-Anomaly Detection in ICN Information-leakage in NDN
Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo 1,2, Thomas Silverston 3, Hideki Tode 4, Tohru Asami 5 and Olivier Perrin 1,2 1 Université de Lorraine, LORIA (CNRS UMR 7503) 2 Inria
More informationCertified Ethical Hacker
Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding
More informationOWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP
OWASP Top 10 Risks Dean.Bushmiller@ExpandingSecurity.com Many thanks to Dave Wichers & OWASP My Mom I got on the email and did a google on my boy My boy works in this Internet thing He makes cyber cafes
More informationSecurity of End User based Cloud Services Sang Young
Security of End User based Cloud Services Sang Young Chairman, Mobile SIG Professional Information Security Association sang.young@pisa.org.hk Cloud Services you can choose Social Media Business Applications
More informationService Summary Business Name: Start Date: Advertiser ID:
Page 1 Service Summary Business Name: Start Date: Advertiser ID: BCD Alarms & Locks 05-03-2015 470422914 Page 2 Keyword Rank History Page 3 Keyword Rank History Page 4 Keyword Rank History Page 5 Keyword
More informationA (sample) computerized system for publishing the daily currency exchange rates
A (sample) computerized system for publishing the daily currency exchange rates The Treasury Department has constructed a computerized system that publishes the daily exchange rates of the local currency
More informationQuick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.
Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security
More informationInternet of Things Security standards
Internet of Things Security standards Vangelis Gazis (vangelis.gazis@huawei.com) Chief Architect Security Internet of Things (IoT) Security Solution Planning & Architecture Design (SPD) Security standards
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationAll About Search Engines. By Zulyn Hernandez
All About Search Engines By Zulyn Hernandez WWW.YAHOO.COM WWW.GOOGLE.COM WWW.DOGPILE.COM WWW.ASKJEEVES.COM Search Engines WWW.NORTHERNLIGHTS.COM WWW.ALTAVISTA.COM Search and advanced Search features The
More informationA web directory lists web sites by category and subcategory. Web directory entries are usually found and categorized by humans.
1 After WWW protocol was introduced in Internet in the early 1990s and the number of web servers started to grow, the first technology that appeared to be able to locate them were Internet listings, also
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationLaura Arribas Vodafone WAC 6th ETSI Security Workshop January ETSI, Sophia Antipolis, France
Security in WAC Laura Arribas Vodafone WAC (laura.arribas@vodafone.com) 6th ETSI Security Workshop 19 20 January 2011 - ETSI, Sophia Antipolis, France The largest wholesale applications platform Money
More informationCurso: Ethical Hacking and Countermeasures
Curso: Ethical Hacking and Countermeasures Module 1: Introduction to Ethical Hacking Who is a Hacker? Essential Terminologies Effects of Hacking Effects of Hacking on Business Elements of Information Security
More informationRed Flag Regulations
Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this
More informationProtecting Information Assets - Week 6 - Creating a Security Aware Organization. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 6 - Creating a Security Aware Organization MIS5206 Week 5 In the News Creating a Security Aware Organization Case Study 2: Autopsy of a Data Breach: The Target Case
More informationETHICAL HACKING & COMPUTER FORENSIC SECURITY
ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,
More informationExtreme Googling! - Advanced Internet Searching
Extreme Googling! - Advanced Internet Searching How to do a Google Web Search Search using Google at: www.google.com Type Google s web address into the Address Bar of your Browse The web address of Google
More informationProtecting Information Assets - Week 5 - Creating a Security Aware Organization. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 5 - Creating a Security Aware Organization MIS5206 Week 5 In the News Readings Case Study 1: HDFC: Securing Online Banking Analysis Due Creating a Security Aware Organization
More informationOSINT 101. What The Internet Knows. March 30, Bill Dean LBMC Information Security Senior Manager
OSINT 101 What The Internet Knows March 30, 2019 Bill Dean LBMC Information Security Senior Manager 1 SEARCH ENGINES Efficient Search Engine Usage Specialized Search Engines Social Networks The Deep and
More informationFRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES
More informationHere are our Advanced SEO Packages designed to help your business succeed further.
Advanced SEO Here are our Advanced SEO Packages designed to help your business succeed further. Hover over the question marks to get a quick description. You may also download this as a PDF with or without
More informationDigital Marketing. Introduction of Marketing. Introductions
Digital Marketing Introduction of Marketing Origin of Marketing Why Marketing is important? What is Marketing? Understanding Marketing Processes Pillars of marketing Marketing is Communication Mass Communication
More information