SlideShare une entreprise Scribd logo
1  sur  34
Phishing és spam Magyarországon és a világban Krasznay Csaba Kancellár.hu Kft.
Az előadás célja ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mennyire rossz a helyzet? ,[object Object],[object Object],[object Object],[object Object],[object Object]
A spamek aránya az e-mail forgalomban Forrás: Symantec, The State of Spam – August 2007
A kéretlen levelek típusai ,[object Object],[object Object],[object Object]
A kéretlen levelek típusai ,[object Object],[object Object],[object Object]
A kéretlen levelek típusai ,[object Object],[object Object],[object Object],[object Object]
A kéretlen levelek típusai Forrás: Symantec, The State of Spam – August 2007
Tőzsdei csalások ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tőzsdei csalások
Tőzsdei csalások ,[object Object],[object Object],[object Object],[object Object]
Termékhamisítások ,[object Object],[object Object],[object Object]
Termékhamisítások
Termékhamisítások ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Gyógyszerreklámok ,[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing levelek ,[object Object],[object Object],[object Object],[object Object],[object Object]
Az adathalászat célpontjai ,[object Object],[object Object],[object Object],[object Object],[object Object]
Forgatókönyv egy magyar adathalász támadásra ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forgatókönyv egy magyar adathalász támadásra
Forgatókönyv egy magyar adathalász támadásra ,[object Object],[object Object],[object Object],[object Object]
A WoW adathalász támadás ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tények az adathalászatról ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A spamek postásai ,[object Object],[object Object],[object Object],[object Object],[object Object]
A spamek postásai ,[object Object],[object Object],[object Object]
A spamek postásai ,[object Object],[object Object]
A spamek postásai ,[object Object],[object Object],[object Object],[object Object]
Spamküldési technikák ,[object Object],[object Object],[object Object],[object Object],[object Object]
Spamküldési technikák
Spamküldési technikák ,[object Object],[object Object],[object Object],[object Object],[object Object]
A spamek áldozatai(?) Forrás: Consumer Attitudes Toward Spam in Six Countries, Business Software Alliance
Harc a spamek ellen ,[object Object],[object Object],[object Object],[object Object]
Harc a spamek ellen ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Összefoglalás ,[object Object],[object Object],[object Object],[object Object],[object Object]
Köszönöm szépen! E-mail cím:  krasznay.csaba @ kancellar.hu Cégünk weboldala:  www.kancellar.hu Az előadás letölthető:  www.krasznay.hu

Contenu connexe

Plus de Csaba Krasznay

Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Csaba Krasznay
 
Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Csaba Krasznay
 
Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Csaba Krasznay
 
Possibilities of IT security evaluations based on Common Criteria in Hungary ...
Possibilities of IT security evaluations based on Common Criteria in Hungary ...Possibilities of IT security evaluations based on Common Criteria in Hungary ...
Possibilities of IT security evaluations based on Common Criteria in Hungary ...Csaba Krasznay
 
The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)Csaba Krasznay
 
Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Csaba Krasznay
 
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Csaba Krasznay
 
Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Csaba Krasznay
 
Hacktivity2009 krasznay
Hacktivity2009 krasznayHacktivity2009 krasznay
Hacktivity2009 krasznayCsaba Krasznay
 
Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Csaba Krasznay
 
Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Csaba Krasznay
 
On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)Csaba Krasznay
 
Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Csaba Krasznay
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Csaba Krasznay
 
Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Csaba Krasznay
 
Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Csaba Krasznay
 
Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Csaba Krasznay
 
Development of a secure e-commerce system based on PKI (in Hungarian)
Development of a secure e-commerce system based on PKI (in Hungarian)Development of a secure e-commerce system based on PKI (in Hungarian)
Development of a secure e-commerce system based on PKI (in Hungarian)Csaba Krasznay
 
Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber securityCsaba Krasznay
 

Plus de Csaba Krasznay (19)

Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)
 
Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...
 
Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)
 
Possibilities of IT security evaluations based on Common Criteria in Hungary ...
Possibilities of IT security evaluations based on Common Criteria in Hungary ...Possibilities of IT security evaluations based on Common Criteria in Hungary ...
Possibilities of IT security evaluations based on Common Criteria in Hungary ...
 
The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)
 
Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)
 
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
 
Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)
 
Hacktivity2009 krasznay
Hacktivity2009 krasznayHacktivity2009 krasznay
Hacktivity2009 krasznay
 
Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)
 
Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)
 
On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)
 
Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
 
Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary
 
Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)
 
Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Wireless network security (in Hungarian)
Wireless network security (in Hungarian)
 
Development of a secure e-commerce system based on PKI (in Hungarian)
Development of a secure e-commerce system based on PKI (in Hungarian)Development of a secure e-commerce system based on PKI (in Hungarian)
Development of a secure e-commerce system based on PKI (in Hungarian)
 
Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber security
 

Phishing and spam in Hungary and worldwide (in Hungarian)