SlideShare une entreprise Scribd logo
1  sur  58
Télécharger pour lire hors ligne
Software & Security
PiTechnologies
www.pitechnologies.net
PiTechnologies is an Egyptian company
PiTechnologies is specialized in:
Mobile Applications Development
Web Applications Development
Security Services
Professional Training Services
About PiTechnologies
www.pitechnologies.net
Agenda
Software Technical Point of View
Basic Security Concepts
Security is a must
www.pitechnologies.net
Technical Point of
View
www.pitechnologies.net
Programming
Concepts
www.pitechnologies.net
www.pitechnologies.net
Code Life Cycle
Source
Codes
Compiler
Object
Files
Linker Exe File
Compiler Based
Run
www.pitechnologies.net
www.pitechnologies.net
Code Life Cycle
Source
Codes
Interpret
er
Interpreter Based
Run
www.pitechnologies.net
www.pitechnologies.net
Source Code
It is human readable code written on a
normal text file
www.pitechnologies.net
www.pitechnologies.net
Compiler
It is the program that transfers the
human like code into a machine code
Compiler targets certain machine
(processor architecture)
Input is source file, output is object file
www.pitechnologies.net
www.pitechnologies.net
Linker
It is a program that gathers all the object
files (compiler output) into a single exe file
Gathering object files into a single exe file
is called static linking, while linking
object file with an external lib is called
dynamic linking
www.pitechnologies.net
www.pitechnologies.net
EXE file
It is the final product (runnable file) in the
compiler based languages
www.pitechnologies.net
www.pitechnologies.net
Compiler Example
GCC
GNU C Compiler
www.pitechnologies.net
www.pitechnologies.net
Interpreter
It is an application that runs the source
code without compiling
A programming language is either
interpreter based or compiler based
www.pitechnologies.net
www.pitechnologies.net
Interpreter Example
Python
Perl
Shell scripting
PHP
www.pitechnologies.net
www.pitechnologies.net
Compiler VS Interpreter
Which is better ?
Wrong Question
www.pitechnologies.net
www.pitechnologies.net
Usage
Compiler Interpreter
Size Large Projects Small Projects
Reuse High reusability Low reusability
Output Application Script
Functions Multi Function Single Function
www.pitechnologies.net
www.pitechnologies.net
Portability Concept
www.pitechnologies.net
www.pitechnologies.net
Why Java ?
Portability
www.pitechnologies.net
www.pitechnologies.net
Portability
It means that you can run the same
executable file on different platforms
Operating System +
Processor Architecture
www.pitechnologies.net
www.pitechnologies.net
Illustration
Platform 1Platform 2
Bin 2 Bin 1
www.pitechnologies.net
www.pitechnologies.net
Illustration
Platform 1Platform 2
Bin 2 Bin 1
Bin 0
JVM
JVM
Bin 0
JVM
JVM
www.pitechnologies.net
www.pitechnologies.net
Benefits
We will change only one app for each
new platform, the JVM
We don’t need to change all the apps for
each new platform
www.pitechnologies.net
www.pitechnologies.net
Security is a Must
www.pitechnologies.net
Laptops Phones Employees
Secure the following …
www.pitechnologies.net
Security Concepts
www.pitechnologies.net
CIATriangle
www.pitechnologies.net
Confidentiality
Preserving authorized restrictions on
information access and disclosure, including
means for protecting personal privacy and
proprietary information
www.pitechnologies.net
Integrity
Guarding against improper information
modification or destruction, including
ensuring information nonrepudiation and
authenticity
www.pitechnologies.net
Availability
Ensuring timely and reliable access to and
use of information
www.pitechnologies.net
Common Attacks
www.pitechnologies.net
Phishing
Session
HiJacking
Password
Reuse
Sniffing
1 2
3 4
www.pitechnologies.net
Phishing
www.pitechnologies.net
Session HiJacking
S	

E	

R	

V	

E	

R
Client
Username + Password + remember me
Cookie
Cookie
www.pitechnologies.net
Session Hijacking
S	

E	

R	

V	

E	

R
Attacker
Victim Machine
Text + JavaScript
XSS
Text + JavaScript
Text: Display	

JS: Run
Cookie
www.pitechnologies.net
Password Reuse
Q?
Do you reuse your password
for many sites ?
www.pitechnologies.net
Don’t Do this !
www.pitechnologies.net
Sniffing
Local Network
Who ?
Public/Cafe/Free
Wifi
Cookies
UnencryptedTraffic
www.pitechnologies.net
Security Facts
www.pitechnologies.net
Do you know ..
www.pitechnologies.net
100 Billion $
Cost of Cyber Crimes / Year
100,000,000,000
www.pitechnologies.net
556 Million Victims / Year
of Cyber Crimes
~ 18 Victim / Second
556,000,000
www.pitechnologies.net
216,000 FB Accounts
hacked / Year
~ 600 Account / Day
216,000
www.pitechnologies.net
36 % of Cyber attacks
target Companies’ networks
and websites
36 %
www.pitechnologies.net
Does not
sound serious yet ..
www.pitechnologies.net
Think of ..
www.pitechnologies.net
Losing all
business/personal
data
1
www.pitechnologies.net
A competitor getting
an access to your
computer
2
www.pitechnologies.net
Employees getting
access to confidential
documents
3
www.pitechnologies.net
A virus halts your
office/home computers
for a week
4
www.pitechnologies.net
A customer see your
website/blog/Facebook
page down, or hacked
5
www.pitechnologies.net
Some one is reading and
sending messages from
your inbox
6
www.pitechnologies.net
It is not an easy job for an attacker to
do the previous issues, howeverDon’t worrymuch ..
YOU
Help him doing this
www.pitechnologies.net
Do you want to know
how you are helping the
attacker ?
www.pitechnologies.net
Finally
www.pitechnologies.net
Learn ..
Think ..
Code ..
www.pitechnologies.net
Change Passwords ..
Dont trust Public Networks ..
Stay Secure ..
www.pitechnologies.net
Easy to Remember
Hard to Guess
• word site number 	

• ahmedfb21@!	

• aHMeDFB21@!	

• zHMdDRG21@!	

!
• Pass for gmail: using gm can be: zHMdDTJ21@!
ahmedfb2121
use shift with second 21
use shift with non vowel letters
use the key below the vowel letter in
the keyboard
use the key above the letter in the
keyboard for the site letters f,b
www.pitechnologies.net
Thanks  for  listening  :)
ayossef@pitechnologies.net	

skype: ahmedyossef.21
facebook.com/PiTechnologies.page

Contenu connexe

Tendances

Trinity Profile 001
Trinity Profile 001Trinity Profile 001
Trinity Profile 001
trifuturein
 

Tendances (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking for beginners and professionals
Ethical hacking for beginners and professionalsEthical hacking for beginners and professionals
Ethical hacking for beginners and professionals
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Trinity Profile 001
Trinity Profile 001Trinity Profile 001
Trinity Profile 001
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber intelligence-services
Cyber intelligence-servicesCyber intelligence-services
Cyber intelligence-services
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Arjun it
Arjun  itArjun  it
Arjun it
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 

En vedette (7)

ITO'13 Orientation
ITO'13 OrientationITO'13 Orientation
ITO'13 Orientation
 
PiTechnologies Profile and Portfolio Dec 2015
PiTechnologies Profile and Portfolio Dec 2015PiTechnologies Profile and Portfolio Dec 2015
PiTechnologies Profile and Portfolio Dec 2015
 
OWASP Top 10 Overview
OWASP Top 10 OverviewOWASP Top 10 Overview
OWASP Top 10 Overview
 
PiTechnologies Sample of Work
PiTechnologies Sample of WorkPiTechnologies Sample of Work
PiTechnologies Sample of Work
 
Maruthi exporrt granite
Maruthi exporrt graniteMaruthi exporrt granite
Maruthi exporrt granite
 
PiTechnologies Services
PiTechnologies ServicesPiTechnologies Services
PiTechnologies Services
 
Project on maruti
Project on marutiProject on maruti
Project on maruti
 

Similaire à Basics of Software and Security

Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 

Similaire à Basics of Software and Security (20)

Testing Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche ExposedTesting Application Security: The Hacker Psyche Exposed
Testing Application Security: The Hacker Psyche Exposed
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
 
How I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data ProductsHow I Learned to Stop Worrying and Love Building Data Products
How I Learned to Stop Worrying and Love Building Data Products
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 
Anti phishing web browser
Anti phishing web browserAnti phishing web browser
Anti phishing web browser
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Avira - NOAH17 Berlin
Avira - NOAH17 BerlinAvira - NOAH17 Berlin
Avira - NOAH17 Berlin
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Plus de PiTechnologies

Plus de PiTechnologies (13)

Real Mobile Applications Pentesting Scinarios (The Weird, the bad and the ugly)
Real Mobile Applications Pentesting Scinarios (The Weird, the bad and the ugly)Real Mobile Applications Pentesting Scinarios (The Weird, the bad and the ugly)
Real Mobile Applications Pentesting Scinarios (The Weird, the bad and the ugly)
 
Getting Things Done
Getting Things DoneGetting Things Done
Getting Things Done
 
Mobile Application Values for Business
Mobile Application Values for BusinessMobile Application Values for Business
Mobile Application Values for Business
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
PiTechnologies Company Profile
PiTechnologies Company ProfilePiTechnologies Company Profile
PiTechnologies Company Profile
 
My CV
My CVMy CV
My CV
 
Design document
Design documentDesign document
Design document
 
Mac story
Mac storyMac story
Mac story
 
Being different
Being different Being different
Being different
 
Professional Graduation Project
Professional Graduation ProjectProfessional Graduation Project
Professional Graduation Project
 
Freelancing
FreelancingFreelancing
Freelancing
 
I os2 2
I os2 2I os2 2
I os2 2
 
I os1
I os1I os1
I os1
 

Dernier

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Dernier (20)

%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

Basics of Software and Security