SlideShare a Scribd company logo
Kevin Power –
11232469
Daniel O’Malley –
06630031
MS810
Information Systems
Security & Ethics



                      MSc Information Systems Management
   In todays world it is
    next to impossible to
    keep ahead of
    hackers.

   Web Browser
    Designers finding it
    hard to keep ahead.
Banking Online   Shopping
Use different Passwords for
different sites to ensure this
doesn’t happen 
Usability   Security
Unorganised   to   Organised
   Zero day exploit –      Injection attack –
    User doesn’t get         Hacker embeds
    chance to defend.        code in legal site.
No not this type
Occurs when user
receives a legitimate
Email from a company
Which contains a link
To a fraud website which
Can take the users
Details.
Not this kind though
   This attack presents
    the user with a
    legitimate looking
    page, but a
    transparent page
    below the legitimate
    one is where the
    attack occurs.
   Mozilla Firefox
   Google Chrome
   Internet Explorer
   Apple’s Safari
Most Used Browser   Most Secure Browser
   They are willing to
    pay out $1 million to
    anyone who can
    hack their Web
    Browser
Powerpoint fp
Powerpoint fp
Powerpoint fp

More Related Content

What's hot

ICT ~Hacking~
ICT ~Hacking~ICT ~Hacking~
ICT ~Hacking~
Nurhidayatul Asma
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Hackers Hit Web Host
Hackers Hit Web HostHackers Hit Web Host
Hackers Hit Web Host
webhostingguy
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
Lookout
 
A Marvelous Guide To Internet Security
A Marvelous Guide To Internet SecurityA Marvelous Guide To Internet Security
A Marvelous Guide To Internet Security
Chris Adriaensen
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
Sarah Roberts
 
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
amiyadutta
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
Athina MINAIDI
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of Ransomware
Symantec
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
JhumarieAcdan
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
Nick Miller
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
Datto
 
Wanna-cry Ransome ware
Wanna-cry Ransome wareWanna-cry Ransome ware
Wanna-cry Ransome ware
ABHAY PATHAK
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
maha5960
 
Listener Article May 2011 P1/6
Listener Article May 2011 P1/6Listener Article May 2011 P1/6
Listener Article May 2011 P1/6
William Grieve
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
Manjula Sridhar
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
jaysonstreet
 

What's hot (20)

ICT ~Hacking~
ICT ~Hacking~ICT ~Hacking~
ICT ~Hacking~
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Hackers Hit Web Host
Hackers Hit Web HostHackers Hit Web Host
Hackers Hit Web Host
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
A Marvelous Guide To Internet Security
A Marvelous Guide To Internet SecurityA Marvelous Guide To Internet Security
A Marvelous Guide To Internet Security
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
Ransomware
RansomwareRansomware
Ransomware
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of Ransomware
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Wanna-cry Ransome ware
Wanna-cry Ransome wareWanna-cry Ransome ware
Wanna-cry Ransome ware
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
Listener Article May 2011 P1/6
Listener Article May 2011 P1/6Listener Article May 2011 P1/6
Listener Article May 2011 P1/6
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 

Viewers also liked

Commit – Getting complex messages across
Commit – Getting complex messages acrossCommit – Getting complex messages across
Commit – Getting complex messages across
RuurdP
 
Experimental study on lls
Experimental study on llsExperimental study on lls
Experimental study on lls
saraaiqbal
 
Task 7
Task 7Task 7
Task 7
tomstr1
 
Για την Ήβη...!!!
Για την Ήβη...!!!Για την Ήβη...!!!
Για την Ήβη...!!!
Dim Karakostas
 
Adverb clause group e (autosaved)
Adverb clause group e (autosaved)Adverb clause group e (autosaved)
Adverb clause group e (autosaved)
Intan Sari
 
Baking is fun!
Baking is fun!Baking is fun!
Baking is fun!
Flávio Vieira
 
Espana-Grecia
Espana-GreciaEspana-Grecia
Espana-Grecia
Dim Karakostas
 
Easter Holidays
Easter HolidaysEaster Holidays
Easter Holidays
Flávio Vieira
 
Task 1
Task 1Task 1
Task 1
tomstr1
 
Perspectiva Sistémica aplicada ao Futebol
Perspectiva Sistémica aplicada ao FutebolPerspectiva Sistémica aplicada ao Futebol
Perspectiva Sistémica aplicada ao Futebol
João Daniel Rico
 
Els abres fruiters
Els abres fruitersEls abres fruiters
Els abres fruiters
tatianaa15
 
language testing: testing writing
language testing: testing writinglanguage testing: testing writing
language testing: testing writing
Intan Sari
 
Educational System of Greece
Educational System of GreeceEducational System of Greece
Educational System of Greece
Dim Karakostas
 
Chapter 6 teaching vocabulary (edited)
Chapter 6 teaching vocabulary (edited)Chapter 6 teaching vocabulary (edited)
Chapter 6 teaching vocabulary (edited)
Intan Sari
 
ESP: Approach is not and language description
ESP: Approach is not and language descriptionESP: Approach is not and language description
ESP: Approach is not and language description
Intan Sari
 
Node.js and NoSQL
Node.js and NoSQLNode.js and NoSQL
Node.js and NoSQL
Nicholas McClay
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filtering
Sanyam Agarwal
 

Viewers also liked (17)

Commit – Getting complex messages across
Commit – Getting complex messages acrossCommit – Getting complex messages across
Commit – Getting complex messages across
 
Experimental study on lls
Experimental study on llsExperimental study on lls
Experimental study on lls
 
Task 7
Task 7Task 7
Task 7
 
Για την Ήβη...!!!
Για την Ήβη...!!!Για την Ήβη...!!!
Για την Ήβη...!!!
 
Adverb clause group e (autosaved)
Adverb clause group e (autosaved)Adverb clause group e (autosaved)
Adverb clause group e (autosaved)
 
Baking is fun!
Baking is fun!Baking is fun!
Baking is fun!
 
Espana-Grecia
Espana-GreciaEspana-Grecia
Espana-Grecia
 
Easter Holidays
Easter HolidaysEaster Holidays
Easter Holidays
 
Task 1
Task 1Task 1
Task 1
 
Perspectiva Sistémica aplicada ao Futebol
Perspectiva Sistémica aplicada ao FutebolPerspectiva Sistémica aplicada ao Futebol
Perspectiva Sistémica aplicada ao Futebol
 
Els abres fruiters
Els abres fruitersEls abres fruiters
Els abres fruiters
 
language testing: testing writing
language testing: testing writinglanguage testing: testing writing
language testing: testing writing
 
Educational System of Greece
Educational System of GreeceEducational System of Greece
Educational System of Greece
 
Chapter 6 teaching vocabulary (edited)
Chapter 6 teaching vocabulary (edited)Chapter 6 teaching vocabulary (edited)
Chapter 6 teaching vocabulary (edited)
 
ESP: Approach is not and language description
ESP: Approach is not and language descriptionESP: Approach is not and language description
ESP: Approach is not and language description
 
Node.js and NoSQL
Node.js and NoSQLNode.js and NoSQL
Node.js and NoSQL
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filtering
 

Similar to Powerpoint fp

Powerpoint
PowerpointPowerpoint
Powerpoint
Whoya11
 
Security Primer
Security PrimerSecurity Primer
Security Primer
Alison Gianotto
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
NirGoldstein5
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdfCloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdf
Time Speed Magazine
 
Cyberhunter Solutions - Reasons Why Your Organisation Needs Network Security...
Cyberhunter Solutions -  Reasons Why Your Organisation Needs Network Security...Cyberhunter Solutions -  Reasons Why Your Organisation Needs Network Security...
Cyberhunter Solutions - Reasons Why Your Organisation Needs Network Security...
Cyberhunter Cyber Security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
JamshidRaqi
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Small Business
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
NetLockSmith
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
Ayu Anita
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
abe8512000
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
Mohamed Elabnody
 

Similar to Powerpoint fp (20)

Powerpoint
PowerpointPowerpoint
Powerpoint
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdfCloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdf
 
Cyberhunter Solutions - Reasons Why Your Organisation Needs Network Security...
Cyberhunter Solutions -  Reasons Why Your Organisation Needs Network Security...Cyberhunter Solutions -  Reasons Why Your Organisation Needs Network Security...
Cyberhunter Solutions - Reasons Why Your Organisation Needs Network Security...
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Powerpoint fp

  • 1. Kevin Power – 11232469 Daniel O’Malley – 06630031 MS810 Information Systems Security & Ethics MSc Information Systems Management
  • 2. In todays world it is next to impossible to keep ahead of hackers.  Web Browser Designers finding it hard to keep ahead.
  • 3. Banking Online Shopping
  • 4.
  • 5. Use different Passwords for different sites to ensure this doesn’t happen 
  • 6.
  • 7. Usability Security
  • 8.
  • 9. Unorganised to Organised
  • 10.
  • 11. Zero day exploit –  Injection attack – User doesn’t get Hacker embeds chance to defend. code in legal site.
  • 12. No not this type
  • 13. Occurs when user receives a legitimate Email from a company Which contains a link To a fraud website which Can take the users Details.
  • 14. Not this kind though
  • 15.
  • 16. This attack presents the user with a legitimate looking page, but a transparent page below the legitimate one is where the attack occurs.
  • 17. Mozilla Firefox  Google Chrome  Internet Explorer  Apple’s Safari
  • 18. Most Used Browser Most Secure Browser
  • 19. They are willing to pay out $1 million to anyone who can hack their Web Browser