Download - Powerpoint fp

Transcript
Page 1: Powerpoint fp

Kevin Power –

11232469

Daniel O’Malley –

06630031

MS810

Information Systems

Security & Ethics

MSc Information Systems Management

Page 2: Powerpoint fp

In todays world it is

next to impossible to keep ahead of

hackers.

Web Browser

Designers finding it

hard to keep ahead.

Page 3: Powerpoint fp

Sh

op

pin

gB

an

kin

g O

nlin

e

Page 4: Powerpoint fp
Page 5: Powerpoint fp

Use different Passwords for

different sites to ensure this doesn’t happen

Page 6: Powerpoint fp
Page 7: Powerpoint fp

SecurityUsability

Page 8: Powerpoint fp
Page 9: Powerpoint fp

Unorganised Organisedto

Page 10: Powerpoint fp
Page 11: Powerpoint fp

Zero day exploit –

User doesn’t get chance to defend.

Injection attack –

Hacker embeds code in legal site.

Page 12: Powerpoint fp

No not this type

Page 13: Powerpoint fp

Occurs when user

receives a legitimate

Email from a company

Which contains a link

To a fraud website which

Can take the users

Details.

Page 14: Powerpoint fp

Not this kind though

Page 15: Powerpoint fp
Page 16: Powerpoint fp

This attack presents

the user with a legitimate looking

page, but a

transparent page

below the legitimate one is where the

attack occurs.

Page 17: Powerpoint fp

Mozilla Firefox

Google Chrome

Internet Explorer

Apple’s Safari

Page 18: Powerpoint fp

Most Used Browser Most Secure Browser

Page 19: Powerpoint fp

They are willing to pay out $1 million to

anyone who can

hack their Web

Browser

Page 20: Powerpoint fp
Page 21: Powerpoint fp
Page 22: Powerpoint fp

Top Related