Soumettre la recherche
Mettre en ligne
SYDO - Secure Your Data by Obscurity
•
Télécharger en tant que PPT, PDF
•
0 j'aime
•
629 vues
DefCamp
Suivre
Technologie
Affichage du diaporama
Signaler
Partager
Affichage du diaporama
Signaler
Partager
1 sur 16
Télécharger maintenant
Recommandé
SYDO - Secure Your Data by Obscurity
SYDO - Secure Your Data by Obscurity
Avădănei Andrei
Managing Secrets in Production
Managing Secrets in Production
Erik Osterman
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Hacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databases
sunil kumar
WordPress Security Master Plan
WordPress Security Master Plan
ServerGuy
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
Recommandé
SYDO - Secure Your Data by Obscurity
SYDO - Secure Your Data by Obscurity
Avădănei Andrei
Managing Secrets in Production
Managing Secrets in Production
Erik Osterman
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Hacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databases
sunil kumar
WordPress Security Master Plan
WordPress Security Master Plan
ServerGuy
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
CiNPA Security SIG
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
Blockchain @ Descon 2016
Blockchain @ Descon 2016
P-e-t-a-r
Sql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Karen Lopez
Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
Enumerating Windows Users
Enumerating Windows Users
UTD Computer Security Group
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
Remote Yacht Hacking
Remote Yacht Hacking
DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
Contenu connexe
Similaire à SYDO - Secure Your Data by Obscurity
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
CiNPA Security SIG
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
Blockchain @ Descon 2016
Blockchain @ Descon 2016
P-e-t-a-r
Sql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Karen Lopez
Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
Enumerating Windows Users
Enumerating Windows Users
UTD Computer Security Group
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
Similaire à SYDO - Secure Your Data by Obscurity
(20)
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Cloud computing security
Cloud computing security
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
Pentesting Android Apps
Pentesting Android Apps
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Blockchain @ Descon 2016
Blockchain @ Descon 2016
Sql server security in an insecure world
Sql server security in an insecure world
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Scada Strangelove - 29c3
Scada Strangelove - 29c3
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
Enumerating Windows Users
Enumerating Windows Users
cyber-security-reference-architecture
cyber-security-reference-architecture
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Plus de DefCamp
Remote Yacht Hacking
Remote Yacht Hacking
DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
The Charter of Trust
The Charter of Trust
DefCamp
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp
Building application security with 0 money down
Building application security with 0 money down
DefCamp
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
Connect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp
The lions and the watering hole
The lions and the watering hole
DefCamp
Plus de DefCamp
(20)
Remote Yacht Hacking
Remote Yacht Hacking
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
The Charter of Trust
The Charter of Trust
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
Building application security with 0 money down
Building application security with 0 money down
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
Connect & Inspire Cyber Security
Connect & Inspire Cyber Security
The lions and the watering hole
The lions and the watering hole
Dernier
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Dernier
(20)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
SYDO - Secure Your Data by Obscurity
1.
SYDO – Secure
Your Data by Obscurity Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
2.
Let's make some
research :-)
3.
4.
5.
We should be
more careful!
6.
But we are
lazy...
7.
8.
How it works?
9.
10.
11.
Demo
12.
13.
14.
15.
Questions?
16.
Télécharger maintenant