Submit Search
Upload
Securing the Insecure
โข
Download as PPTX, PDF
โข
2 likes
โข
1,293 views
Prabath Siriwardena
Follow
Securing the Insecure - WSO2Con 2014 USA
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 21
Download now
Recommended
F5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are Failing
Global Business Events
ย
Self Defending Network
Self Defending Network
Swarna Gautam
ย
Self defending networks
Self defending networks
Ravi Kumar Pawanism
ย
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
ย
(SACON) Wayne Tufek - chapter six - dwell time
(SACON) Wayne Tufek - chapter six - dwell time
Priyanka Aash
ย
(SACON) Wayne Tufek - chapter five - attacks
(SACON) Wayne Tufek - chapter five - attacks
Priyanka Aash
ย
Generaciรณn V de ciberataques
Generaciรณn V de ciberataques
Cristian Garcia G.
ย
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
S.E. CTS CERT-GOV-MD
ย
Recommended
F5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are Failing
Global Business Events
ย
Self Defending Network
Self Defending Network
Swarna Gautam
ย
Self defending networks
Self defending networks
Ravi Kumar Pawanism
ย
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
ย
(SACON) Wayne Tufek - chapter six - dwell time
(SACON) Wayne Tufek - chapter six - dwell time
Priyanka Aash
ย
(SACON) Wayne Tufek - chapter five - attacks
(SACON) Wayne Tufek - chapter five - attacks
Priyanka Aash
ย
Generaciรณn V de ciberataques
Generaciรณn V de ciberataques
Cristian Garcia G.
ย
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
S.E. CTS CERT-GOV-MD
ย
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
ForgeRock
ย
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
Inspirisys Solutions Limited
ย
Mohamed-Fathy
Mohamed-Fathy
Mohamed Fathy
ย
รltimos retos en el รกmbito de la Ciberseguridad: Anรกlisis de amenazas Cibernรฉ...
รltimos retos en el รกmbito de la Ciberseguridad: Anรกlisis de amenazas Cibernรฉ...
Cristian Garcia G.
ย
DC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
IceQUICK
ย
Antispam aneb plnoletรฉ ลeลกenรญ
Antispam aneb plnoletรฉ ลeลกenรญ
MarketingArrowECS_CZ
ย
Rsa report v14
Rsa report v14
Nicholas Tan
ย
Presentation
Presentation
mounica_1291
ย
Intel Security Endpoint Protection
Intel Security Endpoint Protection
Trustmarque
ย
Network Security Fundamentals
Network Security Fundamentals
Fat-Thing Gabriel-Culley
ย
Network security
Network security
Nikhil Vyas
ย
Product brochure-print-spread
Product brochure-print-spread
Tran Thi Thuy Tuyet
ย
Cyber security
Cyber security
SanthoshKumar2614
ย
Comprehensive Study Of security of IoT
Comprehensive Study Of security of IoT
Pooja Yadav
ย
Network Securityย Certification
Network Securityย Certification
Vskills
ย
Zymr Cybersecurity
Zymr Cybersecurity
Zymr Inc
ย
Network security
Network security
Ali Kamil
ย
(SACON) Wayne Tufek - chapter one - situational awareness
(SACON) Wayne Tufek - chapter one - situational awareness
Priyanka Aash
ย
Cyber security
Cyber security
Bablu Shofi
ย
Network Security Research Projects Topics
Network Security Research Projects Topics
Network Simulation Tools
ย
Evolution of Internet Identity
Evolution of Internet Identity
Prabath Siriwardena
ย
Building an API Security Ecosystem
Building an API Security Ecosystem
Prabath Siriwardena
ย
More Related Content
What's hot
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
ForgeRock
ย
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
Inspirisys Solutions Limited
ย
Mohamed-Fathy
Mohamed-Fathy
Mohamed Fathy
ย
รltimos retos en el รกmbito de la Ciberseguridad: Anรกlisis de amenazas Cibernรฉ...
รltimos retos en el รกmbito de la Ciberseguridad: Anรกlisis de amenazas Cibernรฉ...
Cristian Garcia G.
ย
DC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
IceQUICK
ย
Antispam aneb plnoletรฉ ลeลกenรญ
Antispam aneb plnoletรฉ ลeลกenรญ
MarketingArrowECS_CZ
ย
Rsa report v14
Rsa report v14
Nicholas Tan
ย
Presentation
Presentation
mounica_1291
ย
Intel Security Endpoint Protection
Intel Security Endpoint Protection
Trustmarque
ย
Network Security Fundamentals
Network Security Fundamentals
Fat-Thing Gabriel-Culley
ย
Network security
Network security
Nikhil Vyas
ย
Product brochure-print-spread
Product brochure-print-spread
Tran Thi Thuy Tuyet
ย
Cyber security
Cyber security
SanthoshKumar2614
ย
Comprehensive Study Of security of IoT
Comprehensive Study Of security of IoT
Pooja Yadav
ย
Network Securityย Certification
Network Securityย Certification
Vskills
ย
Zymr Cybersecurity
Zymr Cybersecurity
Zymr Inc
ย
Network security
Network security
Ali Kamil
ย
(SACON) Wayne Tufek - chapter one - situational awareness
(SACON) Wayne Tufek - chapter one - situational awareness
Priyanka Aash
ย
Cyber security
Cyber security
Bablu Shofi
ย
Network Security Research Projects Topics
Network Security Research Projects Topics
Network Simulation Tools
ย
What's hot
(20)
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
ย
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
ย
Mohamed-Fathy
Mohamed-Fathy
ย
รltimos retos en el รกmbito de la Ciberseguridad: Anรกlisis de amenazas Cibernรฉ...
รltimos retos en el รกmbito de la Ciberseguridad: Anรกlisis de amenazas Cibernรฉ...
ย
DC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
ย
Antispam aneb plnoletรฉ ลeลกenรญ
Antispam aneb plnoletรฉ ลeลกenรญ
ย
Rsa report v14
Rsa report v14
ย
Presentation
Presentation
ย
Intel Security Endpoint Protection
Intel Security Endpoint Protection
ย
Network Security Fundamentals
Network Security Fundamentals
ย
Network security
Network security
ย
Product brochure-print-spread
Product brochure-print-spread
ย
Cyber security
Cyber security
ย
Comprehensive Study Of security of IoT
Comprehensive Study Of security of IoT
ย
Network Securityย Certification
Network Securityย Certification
ย
Zymr Cybersecurity
Zymr Cybersecurity
ย
Network security
Network security
ย
(SACON) Wayne Tufek - chapter one - situational awareness
(SACON) Wayne Tufek - chapter one - situational awareness
ย
Cyber security
Cyber security
ย
Network Security Research Projects Topics
Network Security Research Projects Topics
ย
Viewers also liked
Evolution of Internet Identity
Evolution of Internet Identity
Prabath Siriwardena
ย
Building an API Security Ecosystem
Building an API Security Ecosystem
Prabath Siriwardena
ย
Securing Insecure
Securing Insecure
Prabath Siriwardena
ย
Next-Gen Apps with IoT and Cloud
Next-Gen Apps with IoT and Cloud
Prabath Siriwardena
ย
The Evolution of Internet Identity
The Evolution of Internet Identity
Prabath Siriwardena
ย
Connected Identity : Benefits, Risks & Challenges
Connected Identity : Benefits, Risks & Challenges
Prabath Siriwardena
ย
Identity Management for Web Application Developers
Identity Management for Web Application Developers
Prabath Siriwardena
ย
WSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server Tutorial
Prabath Siriwardena
ย
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
Prabath Siriwardena
ย
Best Practices in Building an API Security Ecosystem
Best Practices in Building an API Security Ecosystem
Prabath Siriwardena
ย
API Security : Patterns and Practices
API Security : Patterns and Practices
Prabath Siriwardena
ย
XML Signature
XML Signature
Prabath Siriwardena
ย
API Security Best Practices & Guidelines
API Security Best Practices & Guidelines
Prabath Siriwardena
ย
Securing Single-Page Applications with OAuth 2.0
Securing Single-Page Applications with OAuth 2.0
Prabath Siriwardena
ย
Open Standards in Identity Management
Open Standards in Identity Management
Prabath Siriwardena
ย
XML Encryption
XML Encryption
Prabath Siriwardena
ย
Deep dive into Java security architecture
Deep dive into Java security architecture
Prabath Siriwardena
ย
Preparing for Tomorrow
Preparing for Tomorrow
Prabath Siriwardena
ย
Viewers also liked
(18)
Evolution of Internet Identity
Evolution of Internet Identity
ย
Building an API Security Ecosystem
Building an API Security Ecosystem
ย
Securing Insecure
Securing Insecure
ย
Next-Gen Apps with IoT and Cloud
Next-Gen Apps with IoT and Cloud
ย
The Evolution of Internet Identity
The Evolution of Internet Identity
ย
Connected Identity : Benefits, Risks & Challenges
Connected Identity : Benefits, Risks & Challenges
ย
Identity Management for Web Application Developers
Identity Management for Web Application Developers
ย
WSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server Tutorial
ย
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
ย
Best Practices in Building an API Security Ecosystem
Best Practices in Building an API Security Ecosystem
ย
API Security : Patterns and Practices
API Security : Patterns and Practices
ย
XML Signature
XML Signature
ย
API Security Best Practices & Guidelines
API Security Best Practices & Guidelines
ย
Securing Single-Page Applications with OAuth 2.0
Securing Single-Page Applications with OAuth 2.0
ย
Open Standards in Identity Management
Open Standards in Identity Management
ย
XML Encryption
XML Encryption
ย
Deep dive into Java security architecture
Deep dive into Java security architecture
ย
Preparing for Tomorrow
Preparing for Tomorrow
ย
More from Prabath Siriwardena
Microservices Security Landscape
Microservices Security Landscape
Prabath Siriwardena
ย
Cloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFE
Prabath Siriwardena
ย
API Security Best Practices & Guidelines
API Security Best Practices & Guidelines
Prabath Siriwardena
ย
Identity is Eating the World!
Identity is Eating the World!
Prabath Siriwardena
ย
Microservices Security Landscape
Microservices Security Landscape
Prabath Siriwardena
ย
OAuth 2.0 Threat Landscape
OAuth 2.0 Threat Landscape
Prabath Siriwardena
ย
GDPR for Identity Architects
GDPR for Identity Architects
Prabath Siriwardena
ย
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
Prabath Siriwardena
ย
OAuth 2.0 Threat Landscapes
OAuth 2.0 Threat Landscapes
Prabath Siriwardena
ย
OAuth 2.0 for Web and Native (Mobile) App Developers
OAuth 2.0 for Web and Native (Mobile) App Developers
Prabath Siriwardena
ย
Advanced API Security
Advanced API Security
Prabath Siriwardena
ย
WS-Trust
WS-Trust
Prabath Siriwardena
ย
More from Prabath Siriwardena
(12)
Microservices Security Landscape
Microservices Security Landscape
ย
Cloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFE
ย
API Security Best Practices & Guidelines
API Security Best Practices & Guidelines
ย
Identity is Eating the World!
Identity is Eating the World!
ย
Microservices Security Landscape
Microservices Security Landscape
ย
OAuth 2.0 Threat Landscape
OAuth 2.0 Threat Landscape
ย
GDPR for Identity Architects
GDPR for Identity Architects
ย
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
ย
OAuth 2.0 Threat Landscapes
OAuth 2.0 Threat Landscapes
ย
OAuth 2.0 for Web and Native (Mobile) App Developers
OAuth 2.0 for Web and Native (Mobile) App Developers
ย
Advanced API Security
Advanced API Security
ย
WS-Trust
WS-Trust
ย
Recently uploaded
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
ย
Top Rated Pune Call Girls Budhwar Peth โ 6297143586 โ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โ 6297143586 โ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
ย
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย
Call Girls In Bangalore โ 7737669865 ๐ฅต Book Your One night Stand
Call Girls In Bangalore โ 7737669865 ๐ฅต Book Your One night Stand
amitlee9823
ย
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
tanu pandey
ย
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
ย
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
ย
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
ย
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
ย
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
ย
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
ย
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
roncy bisnoi
ย
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
ย
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
ย
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
ย
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
DerechoLaboralIndivi
ย
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
ย
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย
Recently uploaded
(20)
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย
Top Rated Pune Call Girls Budhwar Peth โ 6297143586 โ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โ 6297143586 โ Call Me For Genuine Se...
ย
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย
Call Girls In Bangalore โ 7737669865 ๐ฅต Book Your One night Stand
Call Girls In Bangalore โ 7737669865 ๐ฅต Book Your One night Stand
ย
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
ย
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย
Securing the Insecure
1.
Securing the Insecure
Prabath Siriwardena Director of Security Architecture WSO2
2.
Perception
3.
Perception
4.
Perception
5.
Perception
6.
Correctness
7.
C-I-A C-I-A Confidentiality
Integrity Availability
8.
Attacks : RSA
โ March, 2011
9.
Attacks : Adobe
โ October, 2013
10.
Attacks : Target
โ November, 2013
11.
The Weakest Link:
Monoprix, France
12.
The Defense in
Depth: Los Angeles Airport
13.
Insider Attacks: WikiLeaks,
NSA
14.
Insider Attacks: Cyber
Insider Threat (CINDER)
15.
Security by Obscurity:
Microsoft NTLM
16.
Software Security: Code
is the Focus
17.
Operating System Security
18.
Firewalls and IDS
19.
Heartbleed
20.
Threat Modeling
21.
Thank You
Download now