We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBryce Johns
Modified about 1 year ago
When all the net security people are freaking out, it’s probably an okay time to worry
A serious bug in OpenSSL — a library that is used to secure a very, very large percentage of the Internet’s traffic — was yesterday discovered and publicly disclosed
The apps you use, the sites you visit; if they encrypt the data they send back and forth, there’s a good chance they use OpenSSL
This means an attacker could get a server to spit out its secret keys, allowing them to read any communication that they intercept, like it wasn’t encrypted it all …
including the keys it uses to encrypt and decrypt communication (e.g. usernames, passwords, credit cards, etc.)
2+ years Affects 2/3 of web Millions of servers
Discovered and reported to the OpenSSL team by Neel Mehta of Google’s security team
Yahoo was affected Say they patched most of their sites yesterday
Apple, Google, Microsoft not affected Most e-banking sites OK
Flair for drama? Tor says “You might want to stay away from the Internet entirely for the next few days while things settle.”
Do you Yahoo? Use the same password on multiple sites? Might want to change it.
This is breaking news. We’ll await further advice which hopefully will be coming soon
What is Heartbleed? Heartbleed is a vulnerability in OpenSSL software. OpenSSL is encryption software that accesses websites through a “secure” connection,
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service.
Security Through Encryption. Different ways to achieve security of communication data Keep things under lock and key – Physical Encryption Through password.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
Can SSL and TOR be intercepted? Secure Socket Layer.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
The Heartbleed Bug A vulnerability in the OpenSSL Cryptographic Library.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
How to create a SharePoint site MICROSOFT OFFICE SHAREPOINT DESIGNER.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
The Internet Explained
Social impacts of the use of it By: Mohamed Abdalla.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
By Joel Milazzo. Electronic Commerce - the buying and selling of products or services over electronic systems. Common Sites:
© Leaf Solutions, LLC. All Rights Reserved What’s New in Everett Microsoft.Net V1.1.
The Heartbleed Bug Serge Borso
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
Attention After changing your internet browser (proxy) settings, you can only access those web sites allowed/directed by KHU Library. In order to browse.
Protecting Internet Communications: Encryption Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
1 Computer & Web Security Security Problems in Computer Use Privacy-Protecting Techniques Privacy-Protecting Technologies: cryptography, digital.
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
Website on Computer Security By: Brittany Freeman.
Encryption on the Internet Jeff Cohen. Keeping Information Secret What information do we want to be secret? –Credit card number –Social security number.
Peer-to-peer and agent-based computing Case Study: Skype.
ICT IGCSE Reliability & Desirability of Data. You should understand and be able to discuss issues relating to information found on the Internet, including:
Miguel E. Andrés. What is information leakage? An incident where the confidentiality of information has been compromised. Examples  Gmail accounts.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
Internet Research Search Engines & Subject Directories.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
1 Today’s topics Security –Demo from RSA Security (www.rsa.com) –Slides taken from Kevin Wayne & Robert Sedgewick at Princeton University –For further.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
CYBERSAFETY Presentations Keeping Safe on the Internet.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Instructions: Please click your mouse on the screen, everytime you wish the Click Demo to proceed.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Getting on the Web CCSD Technology Team. Post a page to the Web using a simple file transfer process Goal: Process: Create a Web page using Microsoft.
HTTPS Hypertext Transfer Protocol Secure Marcela López Hurtado.
Searching on the Internet Where to look Here a a few Search.
METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/ metadata Camera/image metadata Web browser identification.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
© 2017 SlidePlayer.com Inc. All rights reserved.