SlideShare a Scribd company logo

Handout infosec defense-mechanism-y3dips

Ammar WK
Ammar WKProfessional Bandwidth hunter at Inside your Machine
Information Security Defense Mechanism Ahmad Muammar Bali, 11 Nopember 2011
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[i] http://echo.or.id [ii] http://idsecconf.org
Information Security ,[object Object],[1] http://wikipedia.org
Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[2] http://wikipedia.org
Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[3] http://www.washington.edu/accessit/articles?106
Information Security Defense Mechanism
Know Your Enemy ,[object Object],[object Object],[object Object]
Potential Enemy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Enemy ,[object Object],[object Object],[object Object],[object Object],[4] http://wikipedia.org [5] Mark Pollitt – FBI -http://www.crime-research.org/library/Cyber-terrorism.htm
Potential Enemy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motives ,[object Object],[6]  http://www.zone-h.org/news/id/4737
Attack Vector [7] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[7] http://www.slideshare.net/y3dips/y3dips-who-own-your-sensitive-information
Attack Vector ,[object Object],[object Object],[object Object],[object Object],[object Object],[8]  http://www.sans.org/top-cyber-security-risks
Defense Mechanism ,[object Object]
Education ,[object Object],[object Object],[object Object]
Education ,[object Object],[object Object],[object Object],[9] According to the European Network and Information Security Agency – Wikipedia.org
Security Updates ,[object Object],[object Object],[object Object],[object Object]
Security Updates ,[object Object],[object Object],[object Object]
Security Hardening ,[object Object],[object Object],[object Object],[object Object]
Security Hardening ,[object Object],[object Object],[object Object]
Security Policy [10] ,[object Object],[object Object],[object Object],[10] Wikipedia.org
Security Policy ,[object Object],[object Object],[object Object]
Security Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Device/Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Device/Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup ,[object Object],[object Object],[object Object],[object Object]
Attack Mechanism ,[object Object]
Attack Mechanism ,[object Object],[object Object]
Security Assessment ,[object Object],[object Object],[object Object]
Security Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Demo ,[object Object]
DEMO ,[object Object],[object Object],[object Object],[object Object]
Discussion ,[object Object]
1 of 37

Handout infosec defense-mechanism-y3dips

Download to read offline

Light version of KOMINFO workshop BIMTEK Teknik Pengamanan Sistem Informasi presentation file - Bali 11-11-11 (minus image, screenshot, poc, video)

Ammar WK
Ammar WKProfessional Bandwidth hunter at Inside your Machine

Recommended

Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareAmmar WK
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingAmmar WK
 
Security researcher
Security researcherSecurity researcher
Security researcherNoumanShah20
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 

More Related Content

What's hot

Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium SecurityJack Mannino
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrichdrewz lin
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2drewz lin
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code ReviewsDenim Group
 
No Website Left Behind: Are We Making Web Security Only for the Elite?
No Website Left Behind: Are We Making Web Security Only for the Elite?No Website Left Behind: Are We Making Web Security Only for the Elite?
No Website Left Behind: Are We Making Web Security Only for the Elite?Terri Oda
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 

What's hot (20)

New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2
 
Code protection
Code protectionCode protection
Code protection
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
 
No Website Left Behind: Are We Making Web Security Only for the Elite?
No Website Left Behind: Are We Making Web Security Only for the Elite?No Website Left Behind: Are We Making Web Security Only for the Elite?
No Website Left Behind: Are We Making Web Security Only for the Elite?
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 

Viewers also liked

Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) NasionalPerancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) NasionalAries Syamsuddin
 
Internet Indonesia Dalam Angka (2015 - 2016)
Internet Indonesia Dalam Angka (2015 - 2016)Internet Indonesia Dalam Angka (2015 - 2016)
Internet Indonesia Dalam Angka (2015 - 2016)Indriyatno Banyumurti
 
Profil Pengguna Internet Indonesia 2014 (Riset oleh APJII dan PUSKAKOM UI)
Profil Pengguna Internet Indonesia 2014 (Riset oleh APJII dan PUSKAKOM UI)Profil Pengguna Internet Indonesia 2014 (Riset oleh APJII dan PUSKAKOM UI)
Profil Pengguna Internet Indonesia 2014 (Riset oleh APJII dan PUSKAKOM UI)ICT Watch
 
Infografis Penetrasi dan Perilaku Pengguna Internet Indonesia 2016 APJII
Infografis Penetrasi dan Perilaku Pengguna Internet Indonesia 2016 APJIIInfografis Penetrasi dan Perilaku Pengguna Internet Indonesia 2016 APJII
Infografis Penetrasi dan Perilaku Pengguna Internet Indonesia 2016 APJIICak Oyong
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Digital numbers and landscape in indonesia 2016 updated
Digital numbers and landscape in indonesia 2016   updatedDigital numbers and landscape in indonesia 2016   updated
Digital numbers and landscape in indonesia 2016 updatedSeno Pramuadji
 

Viewers also liked (12)

Public private key
Public private keyPublic private key
Public private key
 
Cryptography
CryptographyCryptography
Cryptography
 
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) NasionalPerancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Internet Indonesia Dalam Angka (2015 - 2016)
Internet Indonesia Dalam Angka (2015 - 2016)Internet Indonesia Dalam Angka (2015 - 2016)
Internet Indonesia Dalam Angka (2015 - 2016)
 
Profil Pengguna Internet Indonesia 2014 (Riset oleh APJII dan PUSKAKOM UI)
Profil Pengguna Internet Indonesia 2014 (Riset oleh APJII dan PUSKAKOM UI)Profil Pengguna Internet Indonesia 2014 (Riset oleh APJII dan PUSKAKOM UI)
Profil Pengguna Internet Indonesia 2014 (Riset oleh APJII dan PUSKAKOM UI)
 
Infografis Penetrasi dan Perilaku Pengguna Internet Indonesia 2016 APJII
Infografis Penetrasi dan Perilaku Pengguna Internet Indonesia 2016 APJIIInfografis Penetrasi dan Perilaku Pengguna Internet Indonesia 2016 APJII
Infografis Penetrasi dan Perilaku Pengguna Internet Indonesia 2016 APJII
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Digital numbers and landscape in indonesia 2016 updated
Digital numbers and landscape in indonesia 2016   updatedDigital numbers and landscape in indonesia 2016   updated
Digital numbers and landscape in indonesia 2016 updated
 
Tableau Server Basics
Tableau Server BasicsTableau Server Basics
Tableau Server Basics
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 

Similar to Handout infosec defense-mechanism-y3dips

Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptxlochanrajdahal
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
Security Vulnerability Of Information Technology
Security Vulnerability Of Information TechnologySecurity Vulnerability Of Information Technology
Security Vulnerability Of Information TechnologyElena
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Global Security Law And Act Of Network Security
Global Security Law And Act Of Network SecurityGlobal Security Law And Act Of Network Security
Global Security Law And Act Of Network SecurityDotha Keller
 
Global Security Law And Act Of Network Security
Global Security Law And Act Of Network SecurityGlobal Security Law And Act Of Network Security
Global Security Law And Act Of Network SecurityRenee Wardowski
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxhimanshuratnama
 

Similar to Handout infosec defense-mechanism-y3dips (20)

Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Security Vulnerability Of Information Technology
Security Vulnerability Of Information TechnologySecurity Vulnerability Of Information Technology
Security Vulnerability Of Information Technology
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
R20BM564.pptx
R20BM564.pptxR20BM564.pptx
R20BM564.pptx
 
R20BM564_NAWARAJSUNARPPT.pptx
R20BM564_NAWARAJSUNARPPT.pptxR20BM564_NAWARAJSUNARPPT.pptx
R20BM564_NAWARAJSUNARPPT.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Global Security Law And Act Of Network Security
Global Security Law And Act Of Network SecurityGlobal Security Law And Act Of Network Security
Global Security Law And Act Of Network Security
 
Global Security Law And Act Of Network Security
Global Security Law And Act Of Network SecurityGlobal Security Law And Act Of Network Security
Global Security Law And Act Of Network Security
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 

More from Ammar WK

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssnAmmar WK
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?Ammar WK
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0dayAmmar WK
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteAmmar WK
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)Ammar WK
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet AnalysisAmmar WK
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)Ammar WK
 
Network security
Network securityNetwork security
Network securityAmmar WK
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security ProfessionalAmmar WK
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationAmmar WK
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A HackerAmmar WK
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?Ammar WK
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkAmmar WK
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Ammar WK
 
Attacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAttacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAmmar WK
 

More from Ammar WK (20)

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssn
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0day
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or White
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet Analysis
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)
 
Network security
Network securityNetwork security
Network security
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security Professional
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A Hacker
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008
 
Attacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAttacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and Profit
 

Recently uploaded

Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Marcio Venturelli
 
2023 Web 3.0 market overview .pdf
2023 Web 3.0 market overview .pdf2023 Web 3.0 market overview .pdf
2023 Web 3.0 market overview .pdfLiveplex
 
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptxAMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptxWriteMe
 
Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7MichaelCalabrese20
 
9C Monthly Newsletter - JAN 2024
9C Monthly Newsletter - JAN 20249C Monthly Newsletter - JAN 2024
9C Monthly Newsletter - JAN 2024PublishingTeam
 
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdfpanel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdfAmirStern2
 
Fundamentals of BI Report Testing - Module 2
Fundamentals of BI Report Testing - Module 2Fundamentals of BI Report Testing - Module 2
Fundamentals of BI Report Testing - Module 2MichaelCalabrese20
 
top 5 world's richest countries
top 5 world's richest countriestop 5 world's richest countries
top 5 world's richest countriesAngelTalosig2
 
Introduction to FORBLUE FLEMION F-9060.pptx
Introduction to FORBLUE FLEMION F-9060.pptxIntroduction to FORBLUE FLEMION F-9060.pptx
Introduction to FORBLUE FLEMION F-9060.pptxAGC Chemicals Americas
 
ITSP Lesson 6 - Information Privacy.pdf
ITSP Lesson 6 - Information Privacy.pdfITSP Lesson 6 - Information Privacy.pdf
ITSP Lesson 6 - Information Privacy.pdfROWELL MARQUINA
 
Breakthrough in Long-Range Drone Inspection.pdf
Breakthrough in Long-Range Drone Inspection.pdfBreakthrough in Long-Range Drone Inspection.pdf
Breakthrough in Long-Range Drone Inspection.pdfveroniquelapierre
 
zdlra-db-migration-5188715.pdf
zdlra-db-migration-5188715.pdfzdlra-db-migration-5188715.pdf
zdlra-db-migration-5188715.pdfAhmed Abdellatif
 
A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboa...
A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboa...A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboa...
A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboa...HakTrak Cybersecurity Squad
 
Disease prediction system using python.pptx
Disease prediction system using python.pptxDisease prediction system using python.pptx
Disease prediction system using python.pptxKeshavRaoPilli
 
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...corphedge274
 
UX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfUX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfsamsung664872
 
Introduction about Graphics Software
Introduction about Graphics SoftwareIntroduction about Graphics Software
Introduction about Graphics SoftwareAayush358079
 
ITSP Lesson 5 - Intellectual Property Rights.pdf
ITSP Lesson 5 - Intellectual Property Rights.pdfITSP Lesson 5 - Intellectual Property Rights.pdf
ITSP Lesson 5 - Intellectual Property Rights.pdfROWELL MARQUINA
 
Global Lighthouse Network - 2021
Global Lighthouse Network - 2021Global Lighthouse Network - 2021
Global Lighthouse Network - 2021Marcio Venturelli
 
Upgrade to 3.1 Planning.pdf
Upgrade to 3.1 Planning.pdfUpgrade to 3.1 Planning.pdf
Upgrade to 3.1 Planning.pdfMarna Walle
 

Recently uploaded (20)

Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Global Lighthouse Network - 2023
Global Lighthouse Network - 2023
 
2023 Web 3.0 market overview .pdf
2023 Web 3.0 market overview .pdf2023 Web 3.0 market overview .pdf
2023 Web 3.0 market overview .pdf
 
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptxAMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
 
Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7
 
9C Monthly Newsletter - JAN 2024
9C Monthly Newsletter - JAN 20249C Monthly Newsletter - JAN 2024
9C Monthly Newsletter - JAN 2024
 
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdfpanel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
 
Fundamentals of BI Report Testing - Module 2
Fundamentals of BI Report Testing - Module 2Fundamentals of BI Report Testing - Module 2
Fundamentals of BI Report Testing - Module 2
 
top 5 world's richest countries
top 5 world's richest countriestop 5 world's richest countries
top 5 world's richest countries
 
Introduction to FORBLUE FLEMION F-9060.pptx
Introduction to FORBLUE FLEMION F-9060.pptxIntroduction to FORBLUE FLEMION F-9060.pptx
Introduction to FORBLUE FLEMION F-9060.pptx
 
ITSP Lesson 6 - Information Privacy.pdf
ITSP Lesson 6 - Information Privacy.pdfITSP Lesson 6 - Information Privacy.pdf
ITSP Lesson 6 - Information Privacy.pdf
 
Breakthrough in Long-Range Drone Inspection.pdf
Breakthrough in Long-Range Drone Inspection.pdfBreakthrough in Long-Range Drone Inspection.pdf
Breakthrough in Long-Range Drone Inspection.pdf
 
zdlra-db-migration-5188715.pdf
zdlra-db-migration-5188715.pdfzdlra-db-migration-5188715.pdf
zdlra-db-migration-5188715.pdf
 
A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboa...
A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboa...A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboa...
A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboa...
 
Disease prediction system using python.pptx
Disease prediction system using python.pptxDisease prediction system using python.pptx
Disease prediction system using python.pptx
 
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
 
UX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfUX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdf
 
Introduction about Graphics Software
Introduction about Graphics SoftwareIntroduction about Graphics Software
Introduction about Graphics Software
 
ITSP Lesson 5 - Intellectual Property Rights.pdf
ITSP Lesson 5 - Intellectual Property Rights.pdfITSP Lesson 5 - Intellectual Property Rights.pdf
ITSP Lesson 5 - Intellectual Property Rights.pdf
 
Global Lighthouse Network - 2021
Global Lighthouse Network - 2021Global Lighthouse Network - 2021
Global Lighthouse Network - 2021
 
Upgrade to 3.1 Planning.pdf
Upgrade to 3.1 Planning.pdfUpgrade to 3.1 Planning.pdf
Upgrade to 3.1 Planning.pdf
 

Handout infosec defense-mechanism-y3dips