We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Builders versus breakers

Formal Metadata

Title
Builders versus breakers
Subtitle
10 online attacks we could have easily prevented
Title of Series
Number of Parts
170
Author
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Is it just me, or are we seeing more online attacks leaking more data year by year? Actually it’s not just me because the statistics are there to prove it. In fact the largest online breach we’ve seen to date was less than six months ago when Adobe became the victim of a 152 million record attack. A couple of months later and Target saw 110 million credit cards stolen making it the largest theft of financial data ever. In fact all told, we’re looking at in the order of over 822 million records gone missing in 2013 alone. The thing is though, when we look back at recent attacks with the clarity of hindsight, they’re almost always easily preventable. Somewhere, somehow, someone had a major oversight in their code – or often many major oversights – that somehow slipped through the cracks, made its way into a production system and was consequently pounced on by someone with malicious intent. In this session we’re going to look through 10 examples of online attacks that should never have happened. Sometimes it’s a single easily preventable flaws in code, sometimes it’s social engineering of people with access to valuable data and other times it’s a chaining of individual risks knitted together in order to compromise the target. We’re going to systematically work through each of these 10 attacks, understand what went wrong and then assess how each system could have been built to be resilient to the attack. The lessons learned in this webinar are intended to help you better secure your systems by learning from the mistakes of those who have gone before you.