Search Engine based Data Leakage

Size: px
Start display at page:

Download "Search Engine based Data Leakage"

Transcription

1 Search Engine based Data Leakage Dipl.-Inf. Hans Pongratz Technische Universität München 4th ETSI Security Workshop January 2009 ETSI, Sophia Antipolis, France

2 Threats to Sensitive Data Employee errors (unintentional) Data stolen by business partner or insider Sabotage Outsider threats - malware, spyware or hackers Sensitive data (e.g.): employee personal data, costumer data, internal documents, R&D, accounting, 2

3 Data Leakage Issues Through Search Engines Axel Springer (Sep 2008) personal data including bank account details of classified ad customers were indexed by search engines. Universität Magdeburg (May 2008) database with personal data of students was indexed by google for 10 days. Astroglid (Apr 2007) list of over customers was exposed via web and indexed by google. 3

4 Search Engines Tasks of a search engine generation and maintenance of search index, processing of search queries, presentation of results. Bot / Crawler WWW Search Engine Index generation: manually automatically Request Result(s) 13th January 2009 Hans Pongratz, TUM, pongratz@tum.de 4

5 Which information are indexed? Most search engines mine web pages images files Some search engines even mine databases social networks news open directories 5

6 Google Search Basics 1 Operator Description + Adds words to search query, even those which google normally ignores, like the - Exclude words or arguments from search ETSI Workshop ~car Searchs the exact phrase Looks for car and its synonyms * wildcard, to match one or more words in search or-operator cache: site: cache:url will not display the current version of the page, but Google s cached version. site:url will only search within specific website or domain. 6

7 Google Search Basics 2 Operator intext: intitle: allintitle: inurl: filetype: daterange: numrange: Results will be restricted to those containing query term in the text query term in the title all query terms in the title given word in the URL particular file format, e.g..pdf,.xls or.doc data, which has been created or modified in specified timeslot. numbers in specified range 7

8 Google Hacking Acronym for the use of search engines to find attack vectors, privacy or security issues via search queries. Examples for information that can be searched: server vulnerabilities log files error messages with too much information passwords stores directories 8

9 Example Queries Search Object internal docs price lists confidential pricelists web cams Apache error Search Query "internal use only" site:yoursite.xyz (pricelist "price list") site:yoursite.xyz (confidential "internal use only") ("price list" pricelist) site:yoursite.xyz intitle:"active webcam page" site:yoursite.xyz intitle: apache tomcat" error report" site:yoursite.xyz More Google Hacking clues and queries 9

10 Some examples on relationships between search engines Try more than one search engine! 10

11 Defacement Found on google.de 11

12 Remote Shell Found on google.de 12

13 Countermeasures Don t put sensitive data on your web server! Check your web servers on a regular basis for threats! Consider using robots.txt with meta-tags (noarchive) What to do in case? Google: Yahoo: help.yahoo.com/l/us/yahoo/search/siteexplorer/delete/index.html Live Search: support.live.com/eform.aspx?productkey=wlsearchcontentremoval Check other search engines and their caches, too! 13

14 Pen-Tests Guidelines ISECOM: Open-Source Security Testing Methodology Manual NIST: Guideline on Network Security Testing BSI: Studie Durchführungskonzept für Penetrationstests OWASP: Open Web Application Security Project Testing Guide Security Standards ISO/IEC 27001/27002 BSI Grundschutz NIST 14

15 Thank you for your attention! 15

Google Hacking. Information Security Summit Cleveland, Ohio. Pete Garvin.

Google Hacking. Information Security Summit Cleveland, Ohio. Pete Garvin. Google Hacking Information Security Summit Cleveland, Ohio Pete Garvin pgarvin@protectus.com October 2005 Google Hacking Overview A few words about Google What is Google Hacking? Why it s relevant How-to

More information

Ontology- and Bayesian- based Information Security Risk Management

Ontology- and Bayesian- based Information Security Risk Management Ontology- and Bayesian- based Information Security Risk Management Stefan Fenz sfenz@securit 4 th ETSI Security Workshop 13 14 January 2009 ETSI, Sophia Antipolis, France Motivation Almost every business

More information

Collecting information

Collecting information Mag. iur. Dr. techn. Michael Sonntag Collecting information E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology

More information

GOOGLE - SECURITY TESTING TOOL. Georgi Staykov

GOOGLE - SECURITY TESTING TOOL. Georgi Staykov International Journal "Information Technologies and Knowledge" Vol.1 / 2007 359 GOOGLE - SECURITY TESTING TOOL Georgi Staykov Abstract: Using Google as a security testing tool, basic and advanced search

More information

This query searches for the word "snowmobile" or phrase "Green Bay" along with the word "snowblower."

This query searches for the word snowmobile or phrase Green Bay along with the word snowblower. Google Hacking 101 Google Search Basics Google being a full-text search engine, it indexes entire web pages instead of just titles and descriptions. This allows comprehensive searches based upon key (query)

More information

Google Hacking (Kind of) and Other Cool Searches

Google Hacking (Kind of) and Other Cool Searches Google Hacking (Kind of) and Other Cool Searches But first a warning GRAMMAR MATTERS Agenda Google Introduction Features and Magic (Maybe) Google Search Technique Google Basic Operators Google Advanced

More information

Instructor: Kathleen Scheaffer Content: Adopted from Gwen Harris

Instructor: Kathleen Scheaffer Content: Adopted from Gwen Harris WEB SEARCHING Instructor: Kathleen Scheaffer Content: Adopted from Gwen Harris http://plc.fis.utoronto.ca/courses/gharris/fis/workshop/ - unless otherwise noted Agenda Introduction Definition of Search

More information

How can I become a super cool open source wiz?

How can I become a super cool open source wiz? How can I become a super cool open source wiz? Google: I m Feeling Lucky Common Google Booleans NOT.this not that AND.this and that OR.this or that Narrows search term -searchterm +searchterm ~searchterm

More information

An Agency Under MOSTI SECURITY ASSURANCE. Securing Our Cyberspace. Copyright 2008 CyberSecurity Malaysia

An Agency Under MOSTI SECURITY ASSURANCE. Securing Our Cyberspace. Copyright 2008 CyberSecurity Malaysia An Agency Under MOSTI Understanding Mobile Phone Threat Vectors 4 th th ETSI Mobile Security Workshop Sophia Antipolis, France SECURITY ASSURANCE Creating Trust & Confidence Mohamad Nizam Kassim, GAWN

More information

Hacking Demonstration. Dr John McCarthy Ph.D. BSc (Hons) MBCS

Hacking Demonstration. Dr John McCarthy Ph.D. BSc (Hons) MBCS Hacking Demonstration Dr John McCarthy Ph.D. BSc (Hons) MBCS Demonstration Deploying effective cyber security is one of the 21 st century s greatest challenges for business. The threats facing businesses

More information

Search Like a Pro. How Search Engines Work. Comparison Search Engine. Comparison Search Engine. How Search Engines Work

Search Like a Pro. How Search Engines Work. Comparison Search Engine. Comparison Search Engine. How Search Engines Work Search Like a Pro Nancy Warren AkLA Conference 2010 How Search Engines Work http://computer.howstuffworks.com/search-engine1.htm Google How Search Engines Crawl a Web Site Yahoo Comparison Search Engine

More information

SECURITY TESTING. Towards a safer web world

SECURITY TESTING. Towards a safer web world SECURITY TESTING Towards a safer web world AGENDA 1. 3 W S OF SECURITY TESTING 2. SECURITY TESTING CONCEPTS 3. SECURITY TESTING TYPES 4. TOP 10 SECURITY RISKS ate: 2013-14 Few Security Breaches September

More information

Searching. Outline. Copyright 2006 Haim Levkowitz. Copyright 2006 Haim Levkowitz

Searching. Outline. Copyright 2006 Haim Levkowitz. Copyright 2006 Haim Levkowitz Searching 1 Outline Goals and Objectives Topic Headlines Introduction Directories Open Directory Project Search Engines Metasearch Engines Search techniques Intelligent Agents Invisible Web Summary 2 1

More information

Table of contents. 1. Backlink Audit Summary...3. Marketer s Center. 2. Site Auditor Summary Social Audit Summary...9

Table of contents. 1. Backlink Audit Summary...3. Marketer s Center. 2. Site Auditor Summary Social Audit Summary...9 EXECUTIVE SUMMARIES Table of contents Marketer s Center 1. Backlink Audit Summary...3 Top Referring TLDs...3 Anchor Text Cloud...3 Anchor Text Phrases...3 Offpage Competitive Comparison...4 Referring Domains...4

More information

Google Search Operators

Google Search Operators Google Search Operators The following table lists the search operators that work with each Google search service. Click on an operator to jump to its description or, to read about all of the operators,

More information

Basics of executing a penetration test

Basics of executing a penetration test Basics of executing a penetration test 25.04.2013, WrUT BAITSE guest lecture Bernhards Blumbergs, CERT.LV Outline Reconnaissance and footprinting Scanning and enumeration System exploitation Outline Reconnaisance

More information

THREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda

THREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda THREAT MODELING IN SOCIAL NETWORKS Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda INTRODUCTION Social Networks popular web service. 62% adults worldwide use social media 65% of world top companies

More information

GOOGLE HACKING!! Date : 10/31/2007. Krishna Prasad Yerrapragada

GOOGLE HACKING!! Date : 10/31/2007. Krishna Prasad Yerrapragada GOOGLE HACKING!! Date : 10/31/2007 Krishna Prasad Yerrapragada Introduction AGENDA What is Google Hacking/GHDB? GHDB Johnny Long How it works? Possible Reasons Approaches to AVOID/RESOLVE Google s Response

More information

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing

More information

You got a website. Now what?

You got a website. Now what? You got a website I got a website! Now what? Adriana Kuehnel Nov.2017 The majority of the traffic to your website will come through a search engine. Need to know: Best practices so ensure your information

More information

deseo: Combating Search-Result Poisoning Yu USF

deseo: Combating Search-Result Poisoning Yu USF deseo: Combating Search-Result Poisoning Yu Jin @MSCS USF Your Google is not SAFE! SEO Poisoning - A new way to spread malware! Why choose SE? 22.4% of Google searches in the top 100 results > 50% for

More information

SOCIAL NETWORKING IN TODAY S BUSINESS WORLD

SOCIAL NETWORKING IN TODAY S BUSINESS WORLD SOCIAL NETWORKING IN TODAY S BUSINESS WORLD AGENDA Review the use of social networking applications within the business environment Review current trends in threats, attacks and incidents Understand how

More information

Introduction. What do you know about web in general and web-searching in specific?

Introduction. What do you know about web in general and web-searching in specific? WEB SEARCHING Introduction What do you know about web in general and web-searching in specific? Web World Wide Web (or WWW, It is called a web because the interconnections between documents resemble a

More information

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture

More information

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking

More information

Security Mutation Algorithm for Google Print and Google s Search Security Deficiency

Security Mutation Algorithm for Google Print and Google s Search Security Deficiency Security Mutation Algorithm for Google Print and Google s Search Security Deficiency Amar Akshat Abstract. The research work prove the fact that Google installs its cookie into the user s system for more

More information

Do you handle student data?

Do you handle student data? Technical University of Munich Do you handle student data? Then think about data protection! To organize the university s degree programs, TUM offers the campus management system TUMonline and the e-learning

More information

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security. Web Security Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming Web Security Slide 1/25 Outline Web insecurity Security strategies General security Listing of server-side risks Language

More information

Searching the Web for Information

Searching the Web for Information Search Xin Liu Searching the Web for Information How a Search Engine Works Basic parts: 1. Crawler: Visits sites on the Internet, discovering Web pages 2. Indexer: building an index to the Web's content

More information

Deep Web. CSF: Forensics Cyber-Security. Part II.B. Techniques and Tools: Network Forensics. Fall 2015 Nuno Santos

Deep Web. CSF: Forensics Cyber-Security. Part II.B. Techniques and Tools: Network Forensics. Fall 2015 Nuno Santos Deep Web Part II.B. Techniques and Tools: Network Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary } The Surface Web } The Deep Web 2 Remember were we are } Our journey in this course:

More information

MOBILE THREAT LANDSCAPE. February 2018

MOBILE THREAT LANDSCAPE. February 2018 MOBILE THREAT LANDSCAPE February 2018 WHERE DO MOBILE THREATS COME FROM? In 2017, mobile applications have been a target of choice for hackers to access and steal data, with 86% of mobile threats coming

More information

Mobile Malfeasance. Exploring Dangerous Mobile Code. Jason Haddix, Director of Penetration Testing

Mobile Malfeasance. Exploring Dangerous Mobile Code. Jason Haddix, Director of Penetration Testing Mobile Malfeasance Exploring Dangerous Mobile Code Jason Haddix, Director of Penetration Testing Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

Ten Tips for Smarter Google Searches Date: Dec 1, 2006 By Michael Miller. Article is provided courtesy of Que.

Ten Tips for Smarter Google Searches Date: Dec 1, 2006 By Michael Miller. Article is provided courtesy of Que. Page 1 of 5 Ten Tips for Smarter Google Searches Date: Dec 1, 2006 By Michael Miller. Article is provided courtesy of Que. Most people use Google in a very inefficient and often ineffective manner. If

More information

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile

More information

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer

More information

How NOT To Get Hacked

How NOT To Get Hacked How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?

More information

Google Search Appliance

Google Search Appliance Google Search Appliance Getting the Most from Your Google Search Appliance Google Search Appliance software version 7.4 Google, Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 www.google.com GSA-QS_200.03

More information

Search With Better Results. by Hewie Poplock

Search With Better Results. by Hewie Poplock Search With Better Results by Hewie Poplock The Google Search Page What is a Search Engine? A search engine is a web site connected to a database that catalogs other Web sites. It will search the actual

More information

SEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail.

SEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail. SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client

More information

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS Restech User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS Your presenter: Vince Gremillion, CISSP 30+ years technical and customer service experience Founder/Co-Owner RESTECH

More information

5 IT security hot topics How safe are you?

5 IT security hot topics How safe are you? 5 IT security hot topics How safe are you? Why this whitepaper? We meet many people in IT, of various levels of experience and fields of work. This whitepaper is written for everybody who wants to read

More information

SEO Search Engine Optimization ~ Certificate ~

SEO Search Engine Optimization ~ Certificate ~ SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client

More information

Digital Marketing for Small Businesses. Amandine - The Marketing Cookie

Digital Marketing for Small Businesses. Amandine - The Marketing Cookie Digital Marketing for Small Businesses Amandine - The Marketing Cookie Search Engine Optimisation What is SEO? SEO stands for Search Engine Optimisation. Definition: SEO is a methodology of strategies,

More information

SEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail.

SEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail. SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client

More information

NETWORK PENETRATION TESTING

NETWORK PENETRATION TESTING NETWORK PENETRATION TESTING LESS The Threat State Sponsored MORE Terrorism Espionage Criminal NOTE: Hackers increasingly showing more potential to cause greater damage MORE Hacker LESS Occurrence Damage

More information

Our sponsors Zequi V Autopsy of Vulnerabilities

Our sponsors Zequi V Autopsy of Vulnerabilities Our sponsors Our sponsors Our sponsors About me Who s me? Ezequiel Zequi Vázquez Backend Developer Sysadmin & DevOps Hacking & Security Speaker since 2013 About me Index 1 Introduction 2 Analysis of Vulnerabilities

More information

Web Application Security. Philippe Bogaerts

Web Application Security. Philippe Bogaerts Web Application Security Philippe Bogaerts OWASP TOP 10 3 Aim of the OWASP Top 10 educate developers, designers, architects and organizations about the consequences of the most common web application security

More information

MIS5206-Section Protecting Information Assets-Exam 1

MIS5206-Section Protecting Information Assets-Exam 1 Your Name Date 1. Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances? a. Policies b. Standards c. Procedures d. Guidelines

More information

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last

More information

Site Auditor Summary. Total Issues: 95 (Change: 87%) 7 Pages Crawled - June 18, Content Issues 2 0% 3 0%

Site Auditor Summary. Total Issues: 95 (Change: 87%) 7 Pages Crawled - June 18, Content Issues 2 0% 3 0% Total : 95 (Change: 87%) 7 Pages Crawled - June 18, 13 Visibility META Content Link Image Semantic % 4 3% % 3 % 86 83% % Visibility pages were blocked by robots.txt A robots.txt file permits or restricts

More information

Domain

Domain SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client

More information

AN OVERVIEW OF SEARCHING AND DISCOVERING WEB BASED INFORMATION RESOURCES

AN OVERVIEW OF SEARCHING AND DISCOVERING WEB BASED INFORMATION RESOURCES Journal of Defense Resources Management No. 1 (1) / 2010 AN OVERVIEW OF SEARCHING AND DISCOVERING Cezar VASILESCU Regional Department of Defense Resources Management Studies Abstract: The Internet becomes

More information

Side Channel Vulnerabilities on the Web - Detection and Prevention. OWASP Education Project. The OWASP Foundation

Side Channel Vulnerabilities on the Web - Detection and Prevention. OWASP Education Project. The OWASP Foundation Side Channel Vulnerabilities on the Web - Detection and Prevention OWASP Education Project Sebastian Schinzel Virtual Forge GmbH University of Mannheim sebastian.schinzel@virtualforge.de Copyright 2007

More information

Application Security & Verification Requirements

Application Security & Verification Requirements Application Security & Verification Requirements David Jones July 2014 This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contains content Copyright 2008 2013 The

More information

Footprinting. Chapter 4

Footprinting. Chapter 4 Footprinting Chapter 4 Losing Control of Information Business loss Information leakage Privacy loss Corporate espionage What Is Footprinting? The process of researching and uncovering details about your

More information

GSMA Security Group Update

GSMA Security Group Update GSMA Security Group Update James Moran jmoran@gsm.org 2 nd ETSI Security Workshop: Future Security 16-17 January 2007 Sophia Antipolis, France GSM ASSOCIATION OVERVIEW World s largest and leading celluar

More information

NIS Platform Working Group 3 Individuals Digital Rights and Capabilities. Dr. Gisela Meister April

NIS Platform Working Group 3 Individuals Digital Rights and Capabilities. Dr. Gisela Meister April NIS Platform Working Group 3 Individuals Digital Rights and Capabilities Dr. Gisela Meister April 08-2014 AoI 1: Individuals Digital Rights and Capabilities AoI 1 s vision is that individuals needs and

More information

An analysis of security in a web application development process

An analysis of security in a web application development process An analysis of security in a web application development process Florent Gontharet Ethical Hacking University of Abertay Dundee MSc Ethical Hacking 2015 Table of Contents Abstract...2 Introduction...3

More information

Exploring Advanced Search Features on the web

Exploring Advanced Search Features on the web Exploring Advanced Search Features on the web Doc 9.82 Ver 1 Netskills original material adapted by October 2005 Central Computing Services Prerequisites This document assumes that you are familiar with

More information

SEO Search Engine Optimization ~ Certificate ~

SEO Search Engine Optimization ~ Certificate ~ SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client

More information

CISO View: Top 4 Major Imperatives for Enterprise Defense

CISO View: Top 4 Major Imperatives for Enterprise Defense CISO View: Top 4 Major Imperatives for Enterprise Defense James Christiansen Chief Information Security Officer Evantix, Inc. Gary Terrell CIPP Chief Information Security Officer Adobe Session ID: Star

More information

Cybersecurity for Health Care Providers

Cybersecurity for Health Care Providers Cybersecurity for Health Care Providers Montgomery County Medical Society Provider Meeting February 28, 2017 T h e MARYLAND HEALTH CARE COMMISSION Overview Cybersecurity defined Cyber-Threats Today Impact

More information

Search With Better Results

Search With Better Results Search With Better Results by Hewie Poplock info@hewie.net https://hewie.net http://cb4s.net Wednesday, March 14, 2018 The Google Search Page What is a Search Engine? A search engine is a web site connected

More information

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 Cybersecurity Questions for Bank CEOs and the Board of Directors 4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors

More information

Name: MDM 4U1 Date: Does the research measure what it is supposed to measuring?

Name: MDM 4U1 Date: Does the research measure what it is supposed to measuring? 2.4 Reporting on Data In this section, we will be finding and reporting on data. Before we do that though we should have a good idea about where to find data and whether we should use it or not. A. Finding

More information

AffiliateBeginnersGuide.com

AffiliateBeginnersGuide.com 1 of 5 AffiliateBeginnersGuide.com Web site catalog - links to guides RSS Feed: http://www.affiliatebeginnersguide.com/affbgfeed.rss Main page http://www.affiliatebeginnersguide.com/ Main page Affiliate

More information

Effective Strategies for Managing Cybersecurity Risks

Effective Strategies for Managing Cybersecurity Risks October 6, 2015 Effective Strategies for Managing Cybersecurity Risks Larry Hessney, CISA, PCI QSA, CIA 1 Everybody s Doing It! 2 Top 10 Cybersecurity Risks Storing, Processing or Transmitting Sensitive

More information

CPTE: Certified Penetration Testing Engineer

CPTE: Certified Penetration Testing Engineer www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification

More information

Advanced Digital Marketing Course

Advanced Digital Marketing Course Page 1 Advanced Digital Marketing Course Launch your successful career in Digital Marketing Page 2 Table of Contents 1. About Varistor. 4 2. About this Course. 5 3. Course Fee 19 4. Batches 19 5. Syllabus

More information

IT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT

IT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT IT SECURITY AT THE GERMAN RESEARCH REACTOR FRM II BASED ON THE GERMAN IT SECURITY GUIDELINE SEWD-IT M. BAUN, R. BROSCHE, A. KASTENMÜLLER Technische Universität München, Forschungsneutronenquelle Heinz

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Search Engine Technology. Mansooreh Jalalyazdi

Search Engine Technology. Mansooreh Jalalyazdi Search Engine Technology Mansooreh Jalalyazdi 1 2 Search Engines. Search engines are programs viewers use to find information they seek by typing in keywords. A list is provided by the Search engine or

More information

Important Information

Important Information Important Information This presentation was created by Patrick Crispen. You are free to reuse this presentation provided that you Not make any money from this presentation. Give credit where credit is

More information

SEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail.

SEO is one of three types of three main web marketing tools: PPC, SEO and Affiliate/Socail. SEO Search Engine Optimization ~ Certificate ~ The most advance & independent SEO from the only web design company who has achieved 1st position on google SA. Template version: 2nd of April 2015 For Client

More information

shwedirectory v4.0 Php Web & Business Directory Script Top 12 Features of shwedirectory Premium Edition

shwedirectory v4.0 Php Web & Business Directory Script Top 12 Features of shwedirectory Premium Edition shwedirectory v4.0 Php Web & Business Directory Script Top 12 Features of shwedirectory Premium Edition 1. Admin Subdomain 2. Content Security Policy (CSP) Header 3. Subdomain for each city and country

More information

Security Challenges in Smart Distribution

Security Challenges in Smart Distribution Security Challenges in Smart Distribution Thomas Bleier Dipl.-Ing. MSc zpm CISSP CEH CISM Thematic Coordinator ICT Security Safety & Security Department AIT Austrian Institute of Technology GmbH Smart

More information

Name-Anomaly Detection in ICN Information-leakage in NDN

Name-Anomaly Detection in ICN Information-leakage in NDN Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo 1,2, Thomas Silverston 3, Hideki Tode 4, Tohru Asami 5 and Olivier Perrin 1,2 1 Université de Lorraine, LORIA (CNRS UMR 7503) 2 Inria

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding

More information

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP OWASP Top 10 Risks Dean.Bushmiller@ExpandingSecurity.com Many thanks to Dave Wichers & OWASP My Mom I got on the email and did a google on my boy My boy works in this Internet thing He makes cyber cafes

More information

Security of End User based Cloud Services Sang Young

Security of End User based Cloud Services Sang Young Security of End User based Cloud Services Sang Young Chairman, Mobile SIG Professional Information Security Association sang.young@pisa.org.hk Cloud Services you can choose Social Media Business Applications

More information

Service Summary Business Name: Start Date: Advertiser ID:

Service Summary Business Name: Start Date: Advertiser ID: Page 1 Service Summary Business Name: Start Date: Advertiser ID: BCD Alarms & Locks 05-03-2015 470422914 Page 2 Keyword Rank History Page 3 Keyword Rank History Page 4 Keyword Rank History Page 5 Keyword

More information

A (sample) computerized system for publishing the daily currency exchange rates

A (sample) computerized system for publishing the daily currency exchange rates A (sample) computerized system for publishing the daily currency exchange rates The Treasury Department has constructed a computerized system that publishes the daily exchange rates of the local currency

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

Internet of Things Security standards

Internet of Things Security standards Internet of Things Security standards Vangelis Gazis (vangelis.gazis@huawei.com) Chief Architect Security Internet of Things (IoT) Security Solution Planning & Architecture Design (SPD) Security standards

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

All About Search Engines. By Zulyn Hernandez

All About Search Engines. By Zulyn Hernandez All About Search Engines By Zulyn Hernandez WWW.YAHOO.COM WWW.GOOGLE.COM WWW.DOGPILE.COM WWW.ASKJEEVES.COM Search Engines WWW.NORTHERNLIGHTS.COM WWW.ALTAVISTA.COM Search and advanced Search features The

More information

A web directory lists web sites by category and subcategory. Web directory entries are usually found and categorized by humans.

A web directory lists web sites by category and subcategory. Web directory entries are usually found and categorized by humans. 1 After WWW protocol was introduced in Internet in the early 1990s and the number of web servers started to grow, the first technology that appeared to be able to locate them were Internet listings, also

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

Laura Arribas Vodafone WAC 6th ETSI Security Workshop January ETSI, Sophia Antipolis, France

Laura Arribas Vodafone WAC 6th ETSI Security Workshop January ETSI, Sophia Antipolis, France Security in WAC Laura Arribas Vodafone WAC (laura.arribas@vodafone.com) 6th ETSI Security Workshop 19 20 January 2011 - ETSI, Sophia Antipolis, France The largest wholesale applications platform Money

More information

Curso: Ethical Hacking and Countermeasures

Curso: Ethical Hacking and Countermeasures Curso: Ethical Hacking and Countermeasures Module 1: Introduction to Ethical Hacking Who is a Hacker? Essential Terminologies Effects of Hacking Effects of Hacking on Business Elements of Information Security

More information

Red Flag Regulations

Red Flag Regulations Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this

More information

Protecting Information Assets - Week 6 - Creating a Security Aware Organization. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 6 - Creating a Security Aware Organization. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 6 - Creating a Security Aware Organization MIS5206 Week 5 In the News Creating a Security Aware Organization Case Study 2: Autopsy of a Data Breach: The Target Case

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

Extreme Googling! - Advanced Internet Searching

Extreme Googling! - Advanced Internet Searching Extreme Googling! - Advanced Internet Searching How to do a Google Web Search Search using Google at: www.google.com Type Google s web address into the Address Bar of your Browse The web address of Google

More information

Protecting Information Assets - Week 5 - Creating a Security Aware Organization. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 5 - Creating a Security Aware Organization. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 5 - Creating a Security Aware Organization MIS5206 Week 5 In the News Readings Case Study 1: HDFC: Securing Online Banking Analysis Due Creating a Security Aware Organization

More information

OSINT 101. What The Internet Knows. March 30, Bill Dean LBMC Information Security Senior Manager

OSINT 101. What The Internet Knows. March 30, Bill Dean LBMC Information Security Senior Manager OSINT 101 What The Internet Knows March 30, 2019 Bill Dean LBMC Information Security Senior Manager 1 SEARCH ENGINES Efficient Search Engine Usage Specialized Search Engines Social Networks The Deep and

More information

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES

More information

Here are our Advanced SEO Packages designed to help your business succeed further.

Here are our Advanced SEO Packages designed to help your business succeed further. Advanced SEO Here are our Advanced SEO Packages designed to help your business succeed further. Hover over the question marks to get a quick description. You may also download this as a PDF with or without

More information

Digital Marketing. Introduction of Marketing. Introductions

Digital Marketing. Introduction of Marketing. Introductions Digital Marketing Introduction of Marketing Origin of Marketing Why Marketing is important? What is Marketing? Understanding Marketing Processes Pillars of marketing Marketing is Communication Mass Communication

More information