Suche senden
Hochladen
Securing the Insecure
•
Als PPTX, PDF herunterladen
•
2 gefällt mir
•
1,293 views
Prabath Siriwardena
Folgen
Securing the Insecure - WSO2Con 2014 USA
Weniger lesen
Mehr lesen
Ingenieurwesen
Melden
Teilen
Melden
Teilen
1 von 21
Jetzt herunterladen
Empfohlen
F5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are Failing
Global Business Events
Self Defending Network
Self Defending Network
Swarna Gautam
Self defending networks
Self defending networks
Ravi Kumar Pawanism
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
(SACON) Wayne Tufek - chapter six - dwell time
(SACON) Wayne Tufek - chapter six - dwell time
Priyanka Aash
(SACON) Wayne Tufek - chapter five - attacks
(SACON) Wayne Tufek - chapter five - attacks
Priyanka Aash
Generación V de ciberataques
Generación V de ciberataques
Cristian Garcia G.
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
S.E. CTS CERT-GOV-MD
Empfohlen
F5 Networks- Why Legacy Security Systems are Failing
F5 Networks- Why Legacy Security Systems are Failing
Global Business Events
Self Defending Network
Self Defending Network
Swarna Gautam
Self defending networks
Self defending networks
Ravi Kumar Pawanism
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
(SACON) Wayne Tufek - chapter six - dwell time
(SACON) Wayne Tufek - chapter six - dwell time
Priyanka Aash
(SACON) Wayne Tufek - chapter five - attacks
(SACON) Wayne Tufek - chapter five - attacks
Priyanka Aash
Generación V de ciberataques
Generación V de ciberataques
Cristian Garcia G.
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
S.E. CTS CERT-GOV-MD
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
ForgeRock
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
Inspirisys Solutions Limited
Mohamed-Fathy
Mohamed-Fathy
Mohamed Fathy
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.
DC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
IceQUICK
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
MarketingArrowECS_CZ
Rsa report v14
Rsa report v14
Nicholas Tan
Presentation
Presentation
mounica_1291
Intel Security Endpoint Protection
Intel Security Endpoint Protection
Trustmarque
Network Security Fundamentals
Network Security Fundamentals
Fat-Thing Gabriel-Culley
Network security
Network security
Nikhil Vyas
Product brochure-print-spread
Product brochure-print-spread
Tran Thi Thuy Tuyet
Cyber security
Cyber security
SanthoshKumar2614
Comprehensive Study Of security of IoT
Comprehensive Study Of security of IoT
Pooja Yadav
Network Security Certification
Network Security Certification
Vskills
Zymr Cybersecurity
Zymr Cybersecurity
Zymr Inc
Network security
Network security
Ali Kamil
(SACON) Wayne Tufek - chapter one - situational awareness
(SACON) Wayne Tufek - chapter one - situational awareness
Priyanka Aash
Cyber security
Cyber security
Bablu Shofi
Network Security Research Projects Topics
Network Security Research Projects Topics
Network Simulation Tools
Evolution of Internet Identity
Evolution of Internet Identity
Prabath Siriwardena
Building an API Security Ecosystem
Building an API Security Ecosystem
Prabath Siriwardena
Weitere ähnliche Inhalte
Was ist angesagt?
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
ForgeRock
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
Inspirisys Solutions Limited
Mohamed-Fathy
Mohamed-Fathy
Mohamed Fathy
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.
DC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
IceQUICK
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
MarketingArrowECS_CZ
Rsa report v14
Rsa report v14
Nicholas Tan
Presentation
Presentation
mounica_1291
Intel Security Endpoint Protection
Intel Security Endpoint Protection
Trustmarque
Network Security Fundamentals
Network Security Fundamentals
Fat-Thing Gabriel-Culley
Network security
Network security
Nikhil Vyas
Product brochure-print-spread
Product brochure-print-spread
Tran Thi Thuy Tuyet
Cyber security
Cyber security
SanthoshKumar2614
Comprehensive Study Of security of IoT
Comprehensive Study Of security of IoT
Pooja Yadav
Network Security Certification
Network Security Certification
Vskills
Zymr Cybersecurity
Zymr Cybersecurity
Zymr Inc
Network security
Network security
Ali Kamil
(SACON) Wayne Tufek - chapter one - situational awareness
(SACON) Wayne Tufek - chapter one - situational awareness
Priyanka Aash
Cyber security
Cyber security
Bablu Shofi
Network Security Research Projects Topics
Network Security Research Projects Topics
Network Simulation Tools
Was ist angesagt?
(20)
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
Mohamed-Fathy
Mohamed-Fathy
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
DC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
Rsa report v14
Rsa report v14
Presentation
Presentation
Intel Security Endpoint Protection
Intel Security Endpoint Protection
Network Security Fundamentals
Network Security Fundamentals
Network security
Network security
Product brochure-print-spread
Product brochure-print-spread
Cyber security
Cyber security
Comprehensive Study Of security of IoT
Comprehensive Study Of security of IoT
Network Security Certification
Network Security Certification
Zymr Cybersecurity
Zymr Cybersecurity
Network security
Network security
(SACON) Wayne Tufek - chapter one - situational awareness
(SACON) Wayne Tufek - chapter one - situational awareness
Cyber security
Cyber security
Network Security Research Projects Topics
Network Security Research Projects Topics
Andere mochten auch
Evolution of Internet Identity
Evolution of Internet Identity
Prabath Siriwardena
Building an API Security Ecosystem
Building an API Security Ecosystem
Prabath Siriwardena
Securing Insecure
Securing Insecure
Prabath Siriwardena
Next-Gen Apps with IoT and Cloud
Next-Gen Apps with IoT and Cloud
Prabath Siriwardena
The Evolution of Internet Identity
The Evolution of Internet Identity
Prabath Siriwardena
Connected Identity : Benefits, Risks & Challenges
Connected Identity : Benefits, Risks & Challenges
Prabath Siriwardena
Identity Management for Web Application Developers
Identity Management for Web Application Developers
Prabath Siriwardena
WSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server Tutorial
Prabath Siriwardena
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
Prabath Siriwardena
Best Practices in Building an API Security Ecosystem
Best Practices in Building an API Security Ecosystem
Prabath Siriwardena
API Security : Patterns and Practices
API Security : Patterns and Practices
Prabath Siriwardena
XML Signature
XML Signature
Prabath Siriwardena
API Security Best Practices & Guidelines
API Security Best Practices & Guidelines
Prabath Siriwardena
Securing Single-Page Applications with OAuth 2.0
Securing Single-Page Applications with OAuth 2.0
Prabath Siriwardena
Open Standards in Identity Management
Open Standards in Identity Management
Prabath Siriwardena
XML Encryption
XML Encryption
Prabath Siriwardena
Deep dive into Java security architecture
Deep dive into Java security architecture
Prabath Siriwardena
Preparing for Tomorrow
Preparing for Tomorrow
Prabath Siriwardena
Andere mochten auch
(18)
Evolution of Internet Identity
Evolution of Internet Identity
Building an API Security Ecosystem
Building an API Security Ecosystem
Securing Insecure
Securing Insecure
Next-Gen Apps with IoT and Cloud
Next-Gen Apps with IoT and Cloud
The Evolution of Internet Identity
The Evolution of Internet Identity
Connected Identity : Benefits, Risks & Challenges
Connected Identity : Benefits, Risks & Challenges
Identity Management for Web Application Developers
Identity Management for Web Application Developers
WSO2Con USA 2014 - Identity Server Tutorial
WSO2Con USA 2014 - Identity Server Tutorial
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
Best Practices in Building an API Security Ecosystem
Best Practices in Building an API Security Ecosystem
API Security : Patterns and Practices
API Security : Patterns and Practices
XML Signature
XML Signature
API Security Best Practices & Guidelines
API Security Best Practices & Guidelines
Securing Single-Page Applications with OAuth 2.0
Securing Single-Page Applications with OAuth 2.0
Open Standards in Identity Management
Open Standards in Identity Management
XML Encryption
XML Encryption
Deep dive into Java security architecture
Deep dive into Java security architecture
Preparing for Tomorrow
Preparing for Tomorrow
Mehr von Prabath Siriwardena
Microservices Security Landscape
Microservices Security Landscape
Prabath Siriwardena
Cloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFE
Prabath Siriwardena
API Security Best Practices & Guidelines
API Security Best Practices & Guidelines
Prabath Siriwardena
Identity is Eating the World!
Identity is Eating the World!
Prabath Siriwardena
Microservices Security Landscape
Microservices Security Landscape
Prabath Siriwardena
OAuth 2.0 Threat Landscape
OAuth 2.0 Threat Landscape
Prabath Siriwardena
GDPR for Identity Architects
GDPR for Identity Architects
Prabath Siriwardena
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
Prabath Siriwardena
OAuth 2.0 Threat Landscapes
OAuth 2.0 Threat Landscapes
Prabath Siriwardena
OAuth 2.0 for Web and Native (Mobile) App Developers
OAuth 2.0 for Web and Native (Mobile) App Developers
Prabath Siriwardena
Advanced API Security
Advanced API Security
Prabath Siriwardena
WS-Trust
WS-Trust
Prabath Siriwardena
Mehr von Prabath Siriwardena
(12)
Microservices Security Landscape
Microservices Security Landscape
Cloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFE
API Security Best Practices & Guidelines
API Security Best Practices & Guidelines
Identity is Eating the World!
Identity is Eating the World!
Microservices Security Landscape
Microservices Security Landscape
OAuth 2.0 Threat Landscape
OAuth 2.0 Threat Landscape
GDPR for Identity Architects
GDPR for Identity Architects
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
OAuth 2.0 Threat Landscapes
OAuth 2.0 Threat Landscapes
OAuth 2.0 for Web and Native (Mobile) App Developers
OAuth 2.0 for Web and Native (Mobile) App Developers
Advanced API Security
Advanced API Security
WS-Trust
WS-Trust
Kürzlich hochgeladen
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
result management system report for college project
result management system report for college project
Tonystark477637
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Prabhanshu Chaturvedi
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Kürzlich hochgeladen
(20)
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
result management system report for college project
result management system report for college project
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Securing the Insecure
1.
Securing the Insecure
Prabath Siriwardena Director of Security Architecture WSO2
2.
Perception
3.
Perception
4.
Perception
5.
Perception
6.
Correctness
7.
C-I-A C-I-A Confidentiality
Integrity Availability
8.
Attacks : RSA
– March, 2011
9.
Attacks : Adobe
– October, 2013
10.
Attacks : Target
– November, 2013
11.
The Weakest Link:
Monoprix, France
12.
The Defense in
Depth: Los Angeles Airport
13.
Insider Attacks: WikiLeaks,
NSA
14.
Insider Attacks: Cyber
Insider Threat (CINDER)
15.
Security by Obscurity:
Microsoft NTLM
16.
Software Security: Code
is the Focus
17.
Operating System Security
18.
Firewalls and IDS
19.
Heartbleed
20.
Threat Modeling
21.
Thank You
Jetzt herunterladen