SlideShare une entreprise Scribd logo
1  sur  25
Securing Your WordPress Website Vladimir Lasky http://wpexpert.com.au/ WordCamp GC 2011
For the Impatient, Lazy and Easily Distracted ,[object Object],[object Object],[object Object],[object Object]
Does This Describe You? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How We Achieve Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Three Pillars of Security PREVENTION DETECTION RECOVERY
Know Your Enemy ,[object Object],[object Object],[object Object],[object Object],[object Object]
What Do Attackers Want to Achieve? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characterising Security Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top Security Threats ,[object Object],[object Object],[object Object],[object Object],[object Object]
Brute Force Password Attack Example
Classic SQL Injection Example
Malicious Code Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Good Habits ,[object Object],[object Object],[object Object],[object Object]
Choosing a Password ,[object Object],[object Object],[object Object],[object Object]
Secure Your Backups ,[object Object],[object Object],[object Object],[object Object],[object Object]
Automated Remote Backups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plugin: Semisecure Login Reimagined ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plugin: WordPress HTTPS (SSL) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plugin: Theme Authenticity Checker ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plugin: WordPress File Monitor Plus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plugin: WordPress Firewall 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plugin: Useful 404s ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plugin: Email PHP Errors Plugin ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plugin: WP-Ban ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
Thor Kristiansen
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
Chelsea O'Brien
 
Lockdown WordPress
Lockdown WordPressLockdown WordPress
Lockdown WordPress
Dre Armeda
 

Tendances (20)

WordPress Security Updated - NYC Meetup 2009
WordPress Security Updated - NYC Meetup 2009WordPress Security Updated - NYC Meetup 2009
WordPress Security Updated - NYC Meetup 2009
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013
 
WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009WordPress Security - WordCamp NYC 2009
WordPress Security - WordCamp NYC 2009
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
 
WordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress SecurityWordCamp Mid-Atlantic WordPress Security
WordCamp Mid-Atlantic WordPress Security
 
Securing WordPress by Jeff Hoffman
Securing WordPress by Jeff HoffmanSecuring WordPress by Jeff Hoffman
Securing WordPress by Jeff Hoffman
 
WordPress End-User Security - WordCamp Las Vegas 2011
WordPress End-User Security - WordCamp Las Vegas 2011WordPress End-User Security - WordCamp Las Vegas 2011
WordPress End-User Security - WordCamp Las Vegas 2011
 
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKEDWORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
 
Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010Now That's What I Call WordPress Security 2010
Now That's What I Call WordPress Security 2010
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
 
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre ArmedaWordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
 
WordCamp Finland 2015 - WordPress Security
WordCamp Finland 2015 - WordPress SecurityWordCamp Finland 2015 - WordPress Security
WordCamp Finland 2015 - WordPress Security
 
WordPress Security: Defend yourself against digital invaders
WordPress Security:Defend yourself against digital invadersWordPress Security:Defend yourself against digital invaders
WordPress Security: Defend yourself against digital invaders
 
Advanced Thesis Techniques and Tricks
Advanced Thesis Techniques and TricksAdvanced Thesis Techniques and Tricks
Advanced Thesis Techniques and Tricks
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
 
Lockdown WordPress
Lockdown WordPressLockdown WordPress
Lockdown WordPress
 
WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010WordPress Security - WordCamp Boston 2010
WordPress Security - WordCamp Boston 2010
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 

En vedette

Social Entrepreneurship (introduction)
Social Entrepreneurship (introduction)Social Entrepreneurship (introduction)
Social Entrepreneurship (introduction)
Nur Agustinus
 
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
Satapon Yosakonkun
 
Introduction to Agile and SCRUM
Introduction to Agile and SCRUMIntroduction to Agile and SCRUM
Introduction to Agile and SCRUM
Sumeet Moghe
 
Learning is social
Learning is socialLearning is social
Learning is social
Sumeet Moghe
 
Upcoming Unity Schedule
Upcoming Unity ScheduleUpcoming Unity Schedule
Upcoming Unity Schedule
Gary Gangnes
 
Kiat bekerja di tempat baru
Kiat bekerja di tempat baruKiat bekerja di tempat baru
Kiat bekerja di tempat baru
Nur Agustinus
 
Consulting Challenges
Consulting ChallengesConsulting Challenges
Consulting Challenges
Sumeet Moghe
 
Menjadi penjual yang sukses
Menjadi penjual yang suksesMenjadi penjual yang sukses
Menjadi penjual yang sukses
Nur Agustinus
 
OSS & Freeware เพื่อการศึกษา
OSS & Freeware เพื่อการศึกษาOSS & Freeware เพื่อการศึกษา
OSS & Freeware เพื่อการศึกษา
Satapon Yosakonkun
 

En vedette (20)

Social Entrepreneurship (introduction)
Social Entrepreneurship (introduction)Social Entrepreneurship (introduction)
Social Entrepreneurship (introduction)
 
Pebisnis Sosial
Pebisnis SosialPebisnis Sosial
Pebisnis Sosial
 
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
เทคโนโลยี2.0{Web 2.0, Library 2.0, Enterprise 2.0}
 
การทำรายการอ้างอิงด้วย Open Source Reference Manager : Zotero
การทำรายการอ้างอิงด้วย  Open Source Reference Manager : Zoteroการทำรายการอ้างอิงด้วย  Open Source Reference Manager : Zotero
การทำรายการอ้างอิงด้วย Open Source Reference Manager : Zotero
 
Introduction to Agile and SCRUM
Introduction to Agile and SCRUMIntroduction to Agile and SCRUM
Introduction to Agile and SCRUM
 
การบรรยายและสาธิตการจัดทำหนังสือดิจิทัลหายากและเอกสารใบลาน
การบรรยายและสาธิตการจัดทำหนังสือดิจิทัลหายากและเอกสารใบลานการบรรยายและสาธิตการจัดทำหนังสือดิจิทัลหายากและเอกสารใบลาน
การบรรยายและสาธิตการจัดทำหนังสือดิจิทัลหายากและเอกสารใบลาน
 
Learning is social
Learning is socialLearning is social
Learning is social
 
香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare
 
TWI Onboarding
TWI Onboarding TWI Onboarding
TWI Onboarding
 
Upcoming Unity Schedule
Upcoming Unity ScheduleUpcoming Unity Schedule
Upcoming Unity Schedule
 
หยดน้ำบนใบบัว หลวงตามหาบัว ญาณสัมปันโน
หยดน้ำบนใบบัว หลวงตามหาบัว ญาณสัมปันโนหยดน้ำบนใบบัว หลวงตามหาบัว ญาณสัมปันโน
หยดน้ำบนใบบัว หลวงตามหาบัว ญาณสัมปันโน
 
Google Feature
Google FeatureGoogle Feature
Google Feature
 
Kiat bekerja di tempat baru
Kiat bekerja di tempat baruKiat bekerja di tempat baru
Kiat bekerja di tempat baru
 
Consulting Challenges
Consulting ChallengesConsulting Challenges
Consulting Challenges
 
Presentasi Fenomena UFO di Universitas Ciputra
Presentasi Fenomena UFO di Universitas CiputraPresentasi Fenomena UFO di Universitas Ciputra
Presentasi Fenomena UFO di Universitas Ciputra
 
Menjadi penjual yang sukses
Menjadi penjual yang suksesMenjadi penjual yang sukses
Menjadi penjual yang sukses
 
OSS & Freeware เพื่อการศึกษา
OSS & Freeware เพื่อการศึกษาOSS & Freeware เพื่อการศึกษา
OSS & Freeware เพื่อการศึกษา
 
Feedback
FeedbackFeedback
Feedback
 
Dream Team Webinar Slides
Dream Team Webinar SlidesDream Team Webinar Slides
Dream Team Webinar Slides
 
Majalah INFO-UFO no 03
Majalah INFO-UFO no 03Majalah INFO-UFO no 03
Majalah INFO-UFO no 03
 

Similaire à Securing Your WordPress Website - WordCamp GC 2011

Neo word press meetup ehermits - how to keep your blog from being hacked 2012
Neo word press meetup   ehermits - how to keep your blog from being hacked 2012Neo word press meetup   ehermits - how to keep your blog from being hacked 2012
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
Brian Layman
 
Wordpress security issues
Wordpress security issuesWordpress security issues
Wordpress security issues
Deepu Thomas
 

Similaire à Securing Your WordPress Website - WordCamp GC 2011 (20)

Your WordPress Website Is/Not Hacked
Your WordPress Website Is/Not HackedYour WordPress Website Is/Not Hacked
Your WordPress Website Is/Not Hacked
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with php
 
WordPress security
WordPress securityWordPress security
WordPress security
 
WordPress Security
WordPress Security WordPress Security
WordPress Security
 
Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press Blog
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!
 
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
Neo word press meetup   ehermits - how to keep your blog from being hacked 2012Neo word press meetup   ehermits - how to keep your blog from being hacked 2012
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
 
Wordpress Security & Hardening Steps
Wordpress Security & Hardening StepsWordpress Security & Hardening Steps
Wordpress Security & Hardening Steps
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
Wordpress security issues
Wordpress security issuesWordpress security issues
Wordpress security issues
 
The Ultimate Guide to Wordpress Security
The Ultimate Guide to Wordpress SecurityThe Ultimate Guide to Wordpress Security
The Ultimate Guide to Wordpress Security
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress Security
 
Your WordPress Site is and is not Hacked - You don't know until you check
Your WordPress Site is and is not Hacked - You don't know until you checkYour WordPress Site is and is not Hacked - You don't know until you check
Your WordPress Site is and is not Hacked - You don't know until you check
 
Unusual Web Bugs
Unusual Web BugsUnusual Web Bugs
Unusual Web Bugs
 
Web Bugs
Web BugsWeb Bugs
Web Bugs
 
Phpnw security-20111009
Phpnw security-20111009Phpnw security-20111009
Phpnw security-20111009
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Securing Your WordPress Website - WordCamp GC 2011