Professional Documents
Culture Documents
Economy
Valentin P. MĂZĂREANU, Phd Alina MARIN, PhD student
Worm
Trojan horse
Backdoor
Spyware attacks and keyloggers
Snooping or Sniffing
Spoofing
Logic Bombs
Followers
Retweet
Applications Vulnerability
Based on the analysis of 32 million breached passwords
(RockYou.com )
SIP
BYE
Elena Radu
- Interception
- Redirecting
- Calling with different number
Hacker
- Joke: bip every 5 minutes, lasting 5 years
- Call interrupted / Call abandoned
11%
6% email tip "office@"
38%
alte forme de adrese de email
alte mijloace de contact
email tip "centrala@"
31%
email tip "info@"
14%
July, 2008
Obs. office@hvblocuinte.ro (as image) but still office@...
VPNs
Cryptography
Biometry
Behaviometry
Smart Cards
Securing Transaction
OBJECTIVES - ASSETS – NO CONTROLS? = VULNERABILITY - RISK
Auto Industry
Confidentiality of the plans access control policy;
Pension System
•ASSET Integrity of data about employee access control policy in
order to keep the data for a long term;
Ticketing System
Availability of the system business continuity plans;
Conclusions
Thank you and PRMIA promo (see next
slide)
Thank you!
PRMIA Bucharest Chapter INVITES YOU