SlideShare a Scribd company logo
1 of 21
Download to read offline
我们蛋疼的年代——安全篇
       严书
    2010-10-18
请注意工作环境的安全

不是每次
矿难都能
让你有
300W
RMB可以
拿的
请正确面对工作中的意外

不是每
个人都
能让你
欺负的
请正确面对生活中的意外

神马都
是浮云,
只要有
了小月
月
俄史上最性感电脑黑客受审
• 黑客团伙总共有37人,其成员全都来自东
  欧。检方指控他们诈骗和洗钱,涉案金额
  高达600万英镑。
• 斯沃辛斯卡娅使用的木马程序是在网上购
  买的,价值仅为300美元,而她却借此总共
  赚取了3.5万美元的佣金。
美黑客接入互联网将受限
• 美国政府正计划学习借鉴澳大利亚所制定
  的网络安全方案,即网络运营商对于黑客
  使用的电脑可以发出警告同时限制其接入
  互联网。
Facebook
• Tighter Network Security for Facebook
• Facebook rolls out new security tools, talks
  safety
• Key words:log off by phone,OTP(one
  time password), logon list
FBI & Homeland Security
• FBI and Homeland Security Clash over Internet
  Privacy
• Key words:cross purposes
jQuery
• jquery-143-released
• jquery-mobile-alpha-1-released
• 2010-10-16
YUIConf 2010
• November 8-10, 2010, at Yahoo!'s main
  campus in Sunnyvale, CA
• Keynotes:
  – Panel: "The Future of Web Development“
  – Douglas Crockford: "Project Future“
• Sessions:
  – Christian Heilmann, Dav Glass, and Nicholas Zakas
  – YQL, NodeJS, and YUI
YUIConf 2010
Top 10 website security myths
1.    开发人员会处理安全事项
2.    没有人对攻击我的网站感兴趣
3.    网站使用SSL所以是安全的
4.    我们不使用微软的软件,所以是安全的
5.    我们使用防火墙,所以网站处于被保护的状态
6.    我们已经有了一个备份,无后顾之忧
7.    我们的数据进行加密
8.    只需要每年一次的渗透测试
9.    我们的用户已经对电脑做了所有补丁的更新
10.   与服务提供商签订了协议,万事无忧
Top 10 website security issues
1.    输入输出数据的验证
2.    直接访问数据(通过SQL注入)
3.    恶意修改和删除数据
4.    恶意文件的上传
5.    认证和session管理
6.    从系统构造与配置上考虑
7.    钓鱼攻击
8.    拒绝服务攻击
9.    系统信息泄露
10.   错误处理
ASP.NET的安全漏洞
• 攻击方法
 – 重复发送消息,获取错误信息,进而了解加密
   算法(Padding oracle attack)
 – Forms Authentication cookie & AES & Machine
   Key
 – 并不是加密算法AES本身的问题,问题的根源在
   于Private Key的保护
AES = Rijndael 算法
•   分组密码(等长的n分组128/192/256bits)
•   加密与解密模块相同,只是顺序不同
•   抵抗差分分析和线性分析
•   效率快,安全性相当于3DES
Microsoft
• Microsoft Targets Botnets in Software Security
  Report
  – Volume 9 of "Security Intelligence Report"
Microsoft
• 微软测试实验室的服务器被误用做垃圾邮
  件发送机器并发起DOS攻击。
• 微软表示:“受到攻击的设备是运行着
  Linux内核的网络设备”。
Google
• Safe Browsing Alerts for Network
  Administrators
  – 查找自身网站内部的钓鱼链接
夜宴44期《我们蛋疼的年代——安全篇》
夜宴44期《我们蛋疼的年代——安全篇》

More Related Content

Viewers also liked

Deforestation BY Muhammad Fahad Ansari 12IEEM14
Deforestation BY Muhammad Fahad Ansari  12IEEM14Deforestation BY Muhammad Fahad Ansari  12IEEM14
Deforestation BY Muhammad Fahad Ansari 12IEEM14fahadansari131
 
Frank Hovorka_caisse des depots_2011-11-02_Sustainable performance and value
Frank Hovorka_caisse des depots_2011-11-02_Sustainable performance and valueFrank Hovorka_caisse des depots_2011-11-02_Sustainable performance and value
Frank Hovorka_caisse des depots_2011-11-02_Sustainable performance and valueSitra Energia
 
2012 01-17 kurnitski-kaavoituksen vaikutus
2012 01-17 kurnitski-kaavoituksen vaikutus2012 01-17 kurnitski-kaavoituksen vaikutus
2012 01-17 kurnitski-kaavoituksen vaikutusSitra Energia
 
Noponen Kohti kestävää rakennettua ympäristöä Metropolia 2010-11-19
Noponen Kohti kestävää rakennettua ympäristöä Metropolia 2010-11-19Noponen Kohti kestävää rakennettua ympäristöä Metropolia 2010-11-19
Noponen Kohti kestävää rakennettua ympäristöä Metropolia 2010-11-19Sitra Energia
 

Viewers also liked (6)

Viaplay offair
Viaplay offairViaplay offair
Viaplay offair
 
2013 iftr mae_valls
2013 iftr mae_valls2013 iftr mae_valls
2013 iftr mae_valls
 
Deforestation BY Muhammad Fahad Ansari 12IEEM14
Deforestation BY Muhammad Fahad Ansari  12IEEM14Deforestation BY Muhammad Fahad Ansari  12IEEM14
Deforestation BY Muhammad Fahad Ansari 12IEEM14
 
Frank Hovorka_caisse des depots_2011-11-02_Sustainable performance and value
Frank Hovorka_caisse des depots_2011-11-02_Sustainable performance and valueFrank Hovorka_caisse des depots_2011-11-02_Sustainable performance and value
Frank Hovorka_caisse des depots_2011-11-02_Sustainable performance and value
 
2012 01-17 kurnitski-kaavoituksen vaikutus
2012 01-17 kurnitski-kaavoituksen vaikutus2012 01-17 kurnitski-kaavoituksen vaikutus
2012 01-17 kurnitski-kaavoituksen vaikutus
 
Noponen Kohti kestävää rakennettua ympäristöä Metropolia 2010-11-19
Noponen Kohti kestävää rakennettua ympäristöä Metropolia 2010-11-19Noponen Kohti kestävää rakennettua ympäristöä Metropolia 2010-11-19
Noponen Kohti kestävää rakennettua ympäristöä Metropolia 2010-11-19
 

Similar to 夜宴44期《我们蛋疼的年代——安全篇》

e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and DefenseErik Iker
 
Big Data Security (ChinaNetCloud - Guiyang Conference)
Big Data Security (ChinaNetCloud - Guiyang Conference)Big Data Security (ChinaNetCloud - Guiyang Conference)
Big Data Security (ChinaNetCloud - Guiyang Conference)ChinaNetCloud
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfNirGoldstein5
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Malicious Topologies of IPv4
Malicious Topologies of IPv4Malicious Topologies of IPv4
Malicious Topologies of IPv4Bob Rudis
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solutionxKinAnx
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeRocket Matter, LLC
 
Network security
Network securityNetwork security
Network securityNikhil Vyas
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of nortonwacko07
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of nortonspkiely
 
presentation1-160505114853.pdf
presentation1-160505114853.pdfpresentation1-160505114853.pdf
presentation1-160505114853.pdfJaydeepPrajapati33
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-bBbAOC
 

Similar to 夜宴44期《我们蛋疼的年代——安全篇》 (20)

e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and Defense
 
Big Data Security (ChinaNetCloud - Guiyang Conference)
Big Data Security (ChinaNetCloud - Guiyang Conference)Big Data Security (ChinaNetCloud - Guiyang Conference)
Big Data Security (ChinaNetCloud - Guiyang Conference)
 
Web security
Web securityWeb security
Web security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Malicious Topologies of IPv4
Malicious Topologies of IPv4Malicious Topologies of IPv4
Malicious Topologies of IPv4
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
Network security
Network securityNetwork security
Network security
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
 
Network security
Network securityNetwork security
Network security
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
presentation1-160505114853.pdf
presentation1-160505114853.pdfpresentation1-160505114853.pdf
presentation1-160505114853.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
 
Web Security.pptx
Web Security.pptxWeb Security.pptx
Web Security.pptx
 

More from Koubei Banquet

夜宴2期《ActionScript与JavaScript》
夜宴2期《ActionScript与JavaScript》夜宴2期《ActionScript与JavaScript》
夜宴2期《ActionScript与JavaScript》Koubei Banquet
 
夜宴54期《我的关注》
夜宴54期《我的关注》夜宴54期《我的关注》
夜宴54期《我的关注》Koubei Banquet
 
夜宴53期《Tail of 2010 》
夜宴53期《Tail of 2010 》夜宴53期《Tail of 2010 》
夜宴53期《Tail of 2010 》Koubei Banquet
 
夜宴52期《从函数构造到YUI沙箱》
夜宴52期《从函数构造到YUI沙箱》夜宴52期《从函数构造到YUI沙箱》
夜宴52期《从函数构造到YUI沙箱》Koubei Banquet
 
夜宴50期《YUI3 editor》
夜宴50期《YUI3 editor》夜宴50期《YUI3 editor》
夜宴50期《YUI3 editor》Koubei Banquet
 
夜宴49期《YUI Conf 2010》
夜宴49期《YUI Conf 2010》夜宴49期《YUI Conf 2010》
夜宴49期《YUI Conf 2010》Koubei Banquet
 
夜宴48期《一场关于YUI3/jQuery的精彩辩论》
夜宴48期《一场关于YUI3/jQuery的精彩辩论》夜宴48期《一场关于YUI3/jQuery的精彩辩论》
夜宴48期《一场关于YUI3/jQuery的精彩辩论》Koubei Banquet
 
夜宴47期《一个艰难的决定》
夜宴47期《一个艰难的决定》夜宴47期《一个艰难的决定》
夜宴47期《一个艰难的决定》Koubei Banquet
 
夜宴45期《Sociability is complex》
夜宴45期《Sociability is complex》夜宴45期《Sociability is complex》
夜宴45期《Sociability is complex》Koubei Banquet
 
夜宴43期《Auto Tools》
夜宴43期《Auto Tools》夜宴43期《Auto Tools》
夜宴43期《Auto Tools》Koubei Banquet
 
夜宴42期《Gadgets》
夜宴42期《Gadgets》夜宴42期《Gadgets》
夜宴42期《Gadgets》Koubei Banquet
 
夜宴41期《新事》
夜宴41期《新事》夜宴41期《新事》
夜宴41期《新事》Koubei Banquet
 
夜宴40期《表单-反馈-体验》
夜宴40期《表单-反馈-体验》夜宴40期《表单-反馈-体验》
夜宴40期《表单-反馈-体验》Koubei Banquet
 
夜宴39期《Seven》
夜宴39期《Seven》夜宴39期《Seven》
夜宴39期《Seven》Koubei Banquet
 
夜宴38期《侵权 & 山寨》
夜宴38期《侵权 & 山寨》夜宴38期《侵权 & 山寨》
夜宴38期《侵权 & 山寨》Koubei Banquet
 
夜宴37期《专利》
夜宴37期《专利》夜宴37期《专利》
夜宴37期《专利》Koubei Banquet
 
夜宴35期《质量?》
夜宴35期《质量?》夜宴35期《质量?》
夜宴35期《质量?》Koubei Banquet
 
夜宴33期《未来是湿的》
夜宴33期《未来是湿的》夜宴33期《未来是湿的》
夜宴33期《未来是湿的》Koubei Banquet
 
夜宴32期《WordPress and so on》
夜宴32期《WordPress and so on》夜宴32期《WordPress and so on》
夜宴32期《WordPress and so on》Koubei Banquet
 
夜宴31期《浏览器》
夜宴31期《浏览器》夜宴31期《浏览器》
夜宴31期《浏览器》Koubei Banquet
 

More from Koubei Banquet (20)

夜宴2期《ActionScript与JavaScript》
夜宴2期《ActionScript与JavaScript》夜宴2期《ActionScript与JavaScript》
夜宴2期《ActionScript与JavaScript》
 
夜宴54期《我的关注》
夜宴54期《我的关注》夜宴54期《我的关注》
夜宴54期《我的关注》
 
夜宴53期《Tail of 2010 》
夜宴53期《Tail of 2010 》夜宴53期《Tail of 2010 》
夜宴53期《Tail of 2010 》
 
夜宴52期《从函数构造到YUI沙箱》
夜宴52期《从函数构造到YUI沙箱》夜宴52期《从函数构造到YUI沙箱》
夜宴52期《从函数构造到YUI沙箱》
 
夜宴50期《YUI3 editor》
夜宴50期《YUI3 editor》夜宴50期《YUI3 editor》
夜宴50期《YUI3 editor》
 
夜宴49期《YUI Conf 2010》
夜宴49期《YUI Conf 2010》夜宴49期《YUI Conf 2010》
夜宴49期《YUI Conf 2010》
 
夜宴48期《一场关于YUI3/jQuery的精彩辩论》
夜宴48期《一场关于YUI3/jQuery的精彩辩论》夜宴48期《一场关于YUI3/jQuery的精彩辩论》
夜宴48期《一场关于YUI3/jQuery的精彩辩论》
 
夜宴47期《一个艰难的决定》
夜宴47期《一个艰难的决定》夜宴47期《一个艰难的决定》
夜宴47期《一个艰难的决定》
 
夜宴45期《Sociability is complex》
夜宴45期《Sociability is complex》夜宴45期《Sociability is complex》
夜宴45期《Sociability is complex》
 
夜宴43期《Auto Tools》
夜宴43期《Auto Tools》夜宴43期《Auto Tools》
夜宴43期《Auto Tools》
 
夜宴42期《Gadgets》
夜宴42期《Gadgets》夜宴42期《Gadgets》
夜宴42期《Gadgets》
 
夜宴41期《新事》
夜宴41期《新事》夜宴41期《新事》
夜宴41期《新事》
 
夜宴40期《表单-反馈-体验》
夜宴40期《表单-反馈-体验》夜宴40期《表单-反馈-体验》
夜宴40期《表单-反馈-体验》
 
夜宴39期《Seven》
夜宴39期《Seven》夜宴39期《Seven》
夜宴39期《Seven》
 
夜宴38期《侵权 & 山寨》
夜宴38期《侵权 & 山寨》夜宴38期《侵权 & 山寨》
夜宴38期《侵权 & 山寨》
 
夜宴37期《专利》
夜宴37期《专利》夜宴37期《专利》
夜宴37期《专利》
 
夜宴35期《质量?》
夜宴35期《质量?》夜宴35期《质量?》
夜宴35期《质量?》
 
夜宴33期《未来是湿的》
夜宴33期《未来是湿的》夜宴33期《未来是湿的》
夜宴33期《未来是湿的》
 
夜宴32期《WordPress and so on》
夜宴32期《WordPress and so on》夜宴32期《WordPress and so on》
夜宴32期《WordPress and so on》
 
夜宴31期《浏览器》
夜宴31期《浏览器》夜宴31期《浏览器》
夜宴31期《浏览器》
 

夜宴44期《我们蛋疼的年代——安全篇》