SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Top-10 Security Risks
Data
protection
Summary
Client-side Vulnerabilities
Web Browsers
Email Clients
Server-Side Vulnerabilities
Web Applications
Database Software
http://localhost/admin.php?module=news&id=
-1 union select 0,1,database(),3,4,5,6,7 from membres--
Security Policy and Personal
Phishing/Spear Phishing
Conclusion
Internet security is hard because :

Contenu connexe

Tendances

Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecCyberops Infosec LLP
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating SystemMeghaj Mallick
 
Website security
Website securityWebsite security
Website securityRIPPER95
 
Types Of Computer Security Attacks
Types Of Computer Security AttacksTypes Of Computer Security Attacks
Types Of Computer Security AttacksCentextech
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2maranan_zyra
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)Student
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health recordsAnurag Deb
 
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum
 
Unisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_finalUnisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_finalKoko Fontana
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand securityarun nalam
 

Tendances (20)

Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosec
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating System
 
Website security
Website securityWebsite security
Website security
 
Types Of Computer Security Attacks
Types Of Computer Security AttacksTypes Of Computer Security Attacks
Types Of Computer Security Attacks
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
2019resume
2019resume2019resume
2019resume
 
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
Research Group Presentation
Research Group PresentationResearch Group Presentation
Research Group Presentation
 
Security Software
Security SoftwareSecurity Software
Security Software
 
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
 
Unisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_finalUnisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_final
 
System security
System securitySystem security
System security
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
IT viruses
 IT viruses IT viruses
IT viruses
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
 
Moodle security
Moodle securityMoodle security
Moodle security
 

En vedette

A Rights Based Approach To Monitoring The Well Being Of Children In South Africa
A Rights Based Approach To Monitoring The Well Being Of Children In South AfricaA Rights Based Approach To Monitoring The Well Being Of Children In South Africa
A Rights Based Approach To Monitoring The Well Being Of Children In South AfricaThomas Müller
 
Developing Child Rights Indicators
Developing Child Rights IndicatorsDeveloping Child Rights Indicators
Developing Child Rights IndicatorsThomas Müller
 
Data Protection Iin The EU
Data Protection Iin The EUData Protection Iin The EU
Data Protection Iin The EUThomas Müller
 
The Human Rights Based Approach Of The UN
The Human Rights Based Approach Of The UNThe Human Rights Based Approach Of The UN
The Human Rights Based Approach Of The UNThomas Müller
 
FRA Report On Discrimination And Marginalisation
FRA Report On Discrimination And MarginalisationFRA Report On Discrimination And Marginalisation
FRA Report On Discrimination And MarginalisationThomas Müller
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 

En vedette (14)

A Rights Based Approach To Monitoring The Well Being Of Children In South Africa
A Rights Based Approach To Monitoring The Well Being Of Children In South AfricaA Rights Based Approach To Monitoring The Well Being Of Children In South Africa
A Rights Based Approach To Monitoring The Well Being Of Children In South Africa
 
Developing Child Rights Indicators
Developing Child Rights IndicatorsDeveloping Child Rights Indicators
Developing Child Rights Indicators
 
Casenote Sexual Abuse
Casenote Sexual AbuseCasenote Sexual Abuse
Casenote Sexual Abuse
 
Data Protection Iin The EU
Data Protection Iin The EUData Protection Iin The EU
Data Protection Iin The EU
 
BRIS Report 2007
BRIS Report 2007BRIS Report 2007
BRIS Report 2007
 
The Human Rights Based Approach Of The UN
The Human Rights Based Approach Of The UNThe Human Rights Based Approach Of The UN
The Human Rights Based Approach Of The UN
 
FRA Report On Discrimination And Marginalisation
FRA Report On Discrimination And MarginalisationFRA Report On Discrimination And Marginalisation
FRA Report On Discrimination And Marginalisation
 
Lecture 6 data protection and access to client records
Lecture 6  data protection and access to client recordsLecture 6  data protection and access to client records
Lecture 6 data protection and access to client records
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 

Plus de Thomas Müller

Global progress and delay in ending violence against children
Global progress and delay in ending violence against childrenGlobal progress and delay in ending violence against children
Global progress and delay in ending violence against childrenThomas Müller
 
Innovation within organisations: Child Helpline International - Innovation Ex...
Innovation within organisations: Child Helpline International - Innovation Ex...Innovation within organisations: Child Helpline International - Innovation Ex...
Innovation within organisations: Child Helpline International - Innovation Ex...Thomas Müller
 
CHI - coporate identity manual
CHI - coporate identity manualCHI - coporate identity manual
CHI - coporate identity manualThomas Müller
 
Creating a Non-Violent Juvenile Justice
Creating a Non-Violent Juvenile JusticeCreating a Non-Violent Juvenile Justice
Creating a Non-Violent Juvenile JusticeThomas Müller
 
The International NGO Council on Violence Against Children: "creating a non-v...
The International NGO Council on Violence Against Children: "creating a non-v...The International NGO Council on Violence Against Children: "creating a non-v...
The International NGO Council on Violence Against Children: "creating a non-v...Thomas Müller
 
Chat Counselling for Children and Youth - A Handbook
Chat Counselling for Children and Youth - A HandbookChat Counselling for Children and Youth - A Handbook
Chat Counselling for Children and Youth - A HandbookThomas Müller
 
Vulnerabilities Syria Crisis
Vulnerabilities Syria CrisisVulnerabilities Syria Crisis
Vulnerabilities Syria CrisisThomas Müller
 
Fundraising Handbook for child protection and gender based violence in humani...
Fundraising Handbook for child protection and gender based violence in humani...Fundraising Handbook for child protection and gender based violence in humani...
Fundraising Handbook for child protection and gender based violence in humani...Thomas Müller
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Minimum Standards for Child Protection in Humanitarian Action
Minimum Standards for Child Protection in Humanitarian ActionMinimum Standards for Child Protection in Humanitarian Action
Minimum Standards for Child Protection in Humanitarian ActionThomas Müller
 
CHI 2012 International Consultation - Info Pack
CHI 2012 International Consultation - Info PackCHI 2012 International Consultation - Info Pack
CHI 2012 International Consultation - Info PackThomas Müller
 
Harmful practices report
Harmful practices reportHarmful practices report
Harmful practices reportThomas Müller
 
New Media Campaigns from Child helplines
New Media Campaigns from Child helplinesNew Media Campaigns from Child helplines
New Media Campaigns from Child helplinesThomas Müller
 
Trends for child helplines
Trends for child helplinesTrends for child helplines
Trends for child helplinesThomas Müller
 
BRIS New Media Campaigns
BRIS New Media CampaignsBRIS New Media Campaigns
BRIS New Media CampaignsThomas Müller
 
Development of ISPCC Childline Website
Development of ISPCC Childline WebsiteDevelopment of ISPCC Childline Website
Development of ISPCC Childline WebsiteThomas Müller
 

Plus de Thomas Müller (20)

Global progress and delay in ending violence against children
Global progress and delay in ending violence against childrenGlobal progress and delay in ending violence against children
Global progress and delay in ending violence against children
 
Innovation within organisations: Child Helpline International - Innovation Ex...
Innovation within organisations: Child Helpline International - Innovation Ex...Innovation within organisations: Child Helpline International - Innovation Ex...
Innovation within organisations: Child Helpline International - Innovation Ex...
 
CHI - coporate identity manual
CHI - coporate identity manualCHI - coporate identity manual
CHI - coporate identity manual
 
Creating a Non-Violent Juvenile Justice
Creating a Non-Violent Juvenile JusticeCreating a Non-Violent Juvenile Justice
Creating a Non-Violent Juvenile Justice
 
The International NGO Council on Violence Against Children: "creating a non-v...
The International NGO Council on Violence Against Children: "creating a non-v...The International NGO Council on Violence Against Children: "creating a non-v...
The International NGO Council on Violence Against Children: "creating a non-v...
 
Chat Counselling for Children and Youth - A Handbook
Chat Counselling for Children and Youth - A HandbookChat Counselling for Children and Youth - A Handbook
Chat Counselling for Children and Youth - A Handbook
 
Vulnerabilities Syria Crisis
Vulnerabilities Syria CrisisVulnerabilities Syria Crisis
Vulnerabilities Syria Crisis
 
Fundraising Handbook for child protection and gender based violence in humani...
Fundraising Handbook for child protection and gender based violence in humani...Fundraising Handbook for child protection and gender based violence in humani...
Fundraising Handbook for child protection and gender based violence in humani...
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Minimum Standards for Child Protection in Humanitarian Action
Minimum Standards for Child Protection in Humanitarian ActionMinimum Standards for Child Protection in Humanitarian Action
Minimum Standards for Child Protection in Humanitarian Action
 
CHI 2012 International Consultation - Info Pack
CHI 2012 International Consultation - Info PackCHI 2012 International Consultation - Info Pack
CHI 2012 International Consultation - Info Pack
 
Harmful practices report
Harmful practices reportHarmful practices report
Harmful practices report
 
New Media Campaigns from Child helplines
New Media Campaigns from Child helplinesNew Media Campaigns from Child helplines
New Media Campaigns from Child helplines
 
Trends for child helplines
Trends for child helplinesTrends for child helplines
Trends for child helplines
 
CHI Video Workshop
CHI Video WorkshopCHI Video Workshop
CHI Video Workshop
 
BRIS New Media Campaigns
BRIS New Media CampaignsBRIS New Media Campaigns
BRIS New Media Campaigns
 
Chat Counseling
Chat CounselingChat Counseling
Chat Counseling
 
My ISPCC
My ISPCCMy ISPCC
My ISPCC
 
Apps and Privacy
Apps and PrivacyApps and Privacy
Apps and Privacy
 
Development of ISPCC Childline Website
Development of ISPCC Childline WebsiteDevelopment of ISPCC Childline Website
Development of ISPCC Childline Website