We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Builders versus breakers

Formale Metadaten

Titel
Builders versus breakers
Untertitel
10 online attacks we could have easily prevented
Serientitel
Anzahl der Teile
170
Autor
Lizenz
CC-Namensnennung - keine kommerzielle Nutzung - Weitergabe unter gleichen Bedingungen 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen und nicht-kommerziellen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
Is it just me, or are we seeing more online attacks leaking more data year by year? Actually it’s not just me because the statistics are there to prove it. In fact the largest online breach we’ve seen to date was less than six months ago when Adobe became the victim of a 152 million record attack. A couple of months later and Target saw 110 million credit cards stolen making it the largest theft of financial data ever. In fact all told, we’re looking at in the order of over 822 million records gone missing in 2013 alone. The thing is though, when we look back at recent attacks with the clarity of hindsight, they’re almost always easily preventable. Somewhere, somehow, someone had a major oversight in their code – or often many major oversights – that somehow slipped through the cracks, made its way into a production system and was consequently pounced on by someone with malicious intent. In this session we’re going to look through 10 examples of online attacks that should never have happened. Sometimes it’s a single easily preventable flaws in code, sometimes it’s social engineering of people with access to valuable data and other times it’s a chaining of individual risks knitted together in order to compromise the target. We’re going to systematically work through each of these 10 attacks, understand what went wrong and then assess how each system could have been built to be resilient to the attack. The lessons learned in this webinar are intended to help you better secure your systems by learning from the mistakes of those who have gone before you.