Suche senden
Hochladen
SYDO - Secure Your Data by Obscurity
•
Als PPT, PDF herunterladen
•
0 gefällt mir
•
629 views
DefCamp
Folgen
Technologie
Melden
Teilen
Melden
Teilen
1 von 16
Jetzt herunterladen
Empfohlen
SYDO - Secure Your Data by Obscurity
SYDO - Secure Your Data by Obscurity
Avădănei Andrei
Managing Secrets in Production
Managing Secrets in Production
Erik Osterman
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Hacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databases
sunil kumar
WordPress Security Master Plan
WordPress Security Master Plan
ServerGuy
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
Empfohlen
SYDO - Secure Your Data by Obscurity
SYDO - Secure Your Data by Obscurity
Avădănei Andrei
Managing Secrets in Production
Managing Secrets in Production
Erik Osterman
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Hacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databases
sunil kumar
WordPress Security Master Plan
WordPress Security Master Plan
ServerGuy
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
ThreatReel Podcast
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
Blockchain @ Descon 2016
Blockchain @ Descon 2016
P-e-t-a-r
Sql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Karen Lopez
Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
Enumerating Windows Users
Enumerating Windows Users
UTD Computer Security Group
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
Remote Yacht Hacking
Remote Yacht Hacking
DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
Weitere ähnliche Inhalte
Ähnlich wie SYDO - Secure Your Data by Obscurity
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
ThreatReel Podcast
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
Blockchain @ Descon 2016
Blockchain @ Descon 2016
P-e-t-a-r
Sql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Karen Lopez
Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
Enumerating Windows Users
Enumerating Windows Users
UTD Computer Security Group
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
Ähnlich wie SYDO - Secure Your Data by Obscurity
(20)
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Cloud computing security
Cloud computing security
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
Pentesting Android Apps
Pentesting Android Apps
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Blockchain @ Descon 2016
Blockchain @ Descon 2016
Sql server security in an insecure world
Sql server security in an insecure world
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Scada Strangelove - 29c3
Scada Strangelove - 29c3
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
Enumerating Windows Users
Enumerating Windows Users
cyber-security-reference-architecture
cyber-security-reference-architecture
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Mehr von DefCamp
Remote Yacht Hacking
Remote Yacht Hacking
DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
The Charter of Trust
The Charter of Trust
DefCamp
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp
Building application security with 0 money down
Building application security with 0 money down
DefCamp
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
Connect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp
The lions and the watering hole
The lions and the watering hole
DefCamp
Mehr von DefCamp
(20)
Remote Yacht Hacking
Remote Yacht Hacking
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
The Charter of Trust
The Charter of Trust
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
Building application security with 0 money down
Building application security with 0 money down
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
Connect & Inspire Cyber Security
Connect & Inspire Cyber Security
The lions and the watering hole
The lions and the watering hole
Kürzlich hochgeladen
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Kürzlich hochgeladen
(20)
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
SYDO - Secure Your Data by Obscurity
1.
SYDO – Secure
Your Data by Obscurity Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
2.
Let's make some
research :-)
3.
4.
5.
We should be
more careful!
6.
But we are
lazy...
7.
8.
How it works?
9.
10.
11.
Demo
12.
13.
14.
15.
Questions?
16.
Jetzt herunterladen