SlideShare una empresa de Scribd logo
1 de 19
Information Security
          Alfred Thompson
       act2@acthompson.net
    http://www.acthompson.net
    http://blog.acthompson.net
            @AlfredTwo
Introduction

Writing computer Software since 1972
Using the Internet since 1982
27 years working for major software companies
  Most recently 9 years at Microsoft
9 years of teaching and writing textbooks
  Currently on the CS 2012 curriculum committee
Frequent speaker at educational technology events
Agenda


Basic Security
Data Security
Internet hazards
Industry Responsibilities
Lock the Door


Passwords are your keys
  Make them solid
  Keep them safe
  Don’t use the same key for everything
Easy to remember – hard to guess
25 Most Popular Passwords of 2012
1. password    (Unchanged)
2. 123456      (Unchanged)   14. sunshine (Up 1)
3. 12345678    (Unchanged)   15. master (Down 1)
4. abc123      (Up 1)        16. 123123   (Up 4)
5. qwerty      (Down 1)      17. welcome (New)
6. monkey      (Unchanged)   18. shadow (Up 1)
7. letmein     (Up 1)        19. ashley   (Down 3)
8. dragon      (Up 2)        20. football (Up 5)
9. 111111      (Up 3)        21. jesus    (New)
10. baseball   (Up 1)        22. michael (Up 2)
11. iloveyou   (Up 2)        23. ninja    (New)
12. trustno1   (Down 3)      24. mustang (New)
13. 1234567    (Down 6)      25. password1       (New)
Password Extensions
Biometrics
Secondary Passwords
Physical devices
• Smart Cards
• Encryption Keys on flash sticks
Keeping Data Safe
Data Encryption

PGP Whole Disk Encryption
  Product of Symantic
Microsoft BitLocker (Whole Disk)
  Included in Windows 7 and 8
Microsoft Office (Document encryption)
  Not the most secure in the world
PGP International Project
  Open Source
  http://www.pgpi.org/
Encrypted Communications




     https://silentcircle.com/
They Are Out To Get You


                            Phishing
                            E-mail sent by                         Spam
                            online criminals
                                                                   Unwanted
                            to trick you into
                                                                   e-mail, instant
                            revealing personal
                                                                   messages,
                            information
                                                                   and other online
Identity Theft                                                     communication
A crime where con                         Hoaxes
artists get your personal
information and access                    E-mail sent by online
your cash and/or credit                   criminals to trick you
                                          into giving them money
Be Careful Out There
Phishing




http://www.wombatsecurity.com/antiphishingphil
Verify Stories


http://snopes.com/
http://urbanlegends.about.com/

Stories should be sourced!
If it’s too good to be true it probably is false
Why yes it could hurt to pass it along
Malware



Viruses/Worms
Software programs
designed to invade   Trojans
your computer, and   Viruses that pretend to be
copy, damage, or     helpful programs while       Spyware
delete your data.    destroying your              Software that tracks
                     data, damaging your          your online activities or
                     computer, and stealing       displays endless ads.
                     your personal
                     information.
Avoiding Malware


Keep your operating system updated
Install and keep updated an anti virus package
Don’t install things you are not sure of
Pay attention to web browser warnings
Responsibility Goes Both Ways


 SSL for encrypted transactions
 Privacy Policies must be taken seriously
 Companies are responsible for protecting your data
Secure Socket Layer
Application Responsibility
Resources


http://www.microsoft.com/security
http://www.fbi.gov/about-us/investigate/cyber/cyber
http://www.cnet.com/internet-security/

Más contenido relacionado

La actualidad más candente

Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515lisawhipp
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 

La actualidad más candente (19)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Facebook
FacebookFacebook
Facebook
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
E.technology
E.technologyE.technology
E.technology
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
C 7
C 7C 7
C 7
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Are Your Security Aware?
Are Your Security Aware?Are Your Security Aware?
Are Your Security Aware?
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 

Destacado

아틀란티스 호텔 수족관2
아틀란티스 호텔 수족관2아틀란티스 호텔 수족관2
아틀란티스 호텔 수족관2Don Kang
 
Canvas july 21 2015 add students
Canvas july 21 2015 add studentsCanvas july 21 2015 add students
Canvas july 21 2015 add studentsPenny Christensen
 
Content Area Vocabulary Sms 3 20 06b
Content Area Vocabulary Sms 3 20 06bContent Area Vocabulary Sms 3 20 06b
Content Area Vocabulary Sms 3 20 06bPenny Christensen
 
Cała Praga Śpiewa czyli jak to zrobić śpiewająco
Cała Praga Śpiewa czyli jak to zrobić śpiewającoCała Praga Śpiewa czyli jak to zrobić śpiewająco
Cała Praga Śpiewa czyli jak to zrobić śpiewającoPragaNaWalizkach
 
Ziggy ansah1
Ziggy ansah1Ziggy ansah1
Ziggy ansah1turieva18
 
Asignacion maria 3
Asignacion maria 3Asignacion maria 3
Asignacion maria 3tate2096
 
Bitácora 14 de tecnología
Bitácora 14 de tecnologíaBitácora 14 de tecnología
Bitácora 14 de tecnologíaSteisy Contreras
 
Tecnologías aplicadas a la educación
Tecnologías aplicadas a la educaciónTecnologías aplicadas a la educación
Tecnologías aplicadas a la educaciónmelissa duran solares
 
Tu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
Tu Presencia Será Importante Para Lograr El Objetivo De Esta NocheTu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
Tu Presencia Será Importante Para Lograr El Objetivo De Esta Nochemiriam
 
Prepositions after verbs
Prepositions after verbsPrepositions after verbs
Prepositions after verbsJennifer Flores
 
Common mistakes with plurals
Common mistakes with pluralsCommon mistakes with plurals
Common mistakes with pluralsJennifer Flores
 
Thermal management for Printed Circuit Boards
Thermal management for Printed Circuit BoardsThermal management for Printed Circuit Boards
Thermal management for Printed Circuit BoardsR. J. McRep
 
How i am surviving being bought out by
How i am surviving being bought out byHow i am surviving being bought out by
How i am surviving being bought out byKathleen Weaver
 

Destacado (19)

아틀란티스 호텔 수족관2
아틀란티스 호텔 수족관2아틀란티스 호텔 수족관2
아틀란티스 호텔 수족관2
 
Canvas july 21 2015 add students
Canvas july 21 2015 add studentsCanvas july 21 2015 add students
Canvas july 21 2015 add students
 
Content Area Vocabulary Sms 3 20 06b
Content Area Vocabulary Sms 3 20 06bContent Area Vocabulary Sms 3 20 06b
Content Area Vocabulary Sms 3 20 06b
 
Cała Praga Śpiewa czyli jak to zrobić śpiewająco
Cała Praga Śpiewa czyli jak to zrobić śpiewającoCała Praga Śpiewa czyli jak to zrobić śpiewająco
Cała Praga Śpiewa czyli jak to zrobić śpiewająco
 
Facility
FacilityFacility
Facility
 
Ziggy ansah1
Ziggy ansah1Ziggy ansah1
Ziggy ansah1
 
Asignacion maria 3
Asignacion maria 3Asignacion maria 3
Asignacion maria 3
 
Bitácora 14 de tecnología
Bitácora 14 de tecnologíaBitácora 14 de tecnología
Bitácora 14 de tecnología
 
Tecnologías aplicadas a la educación
Tecnologías aplicadas a la educaciónTecnologías aplicadas a la educación
Tecnologías aplicadas a la educación
 
Tu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
Tu Presencia Será Importante Para Lograr El Objetivo De Esta NocheTu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
Tu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
 
MongoDB_Developer
MongoDB_DeveloperMongoDB_Developer
MongoDB_Developer
 
Prepositions after verbs
Prepositions after verbsPrepositions after verbs
Prepositions after verbs
 
Teatro con delitto
Teatro con delittoTeatro con delitto
Teatro con delitto
 
Common mistakes with plurals
Common mistakes with pluralsCommon mistakes with plurals
Common mistakes with plurals
 
Suffixes
SuffixesSuffixes
Suffixes
 
Prepositionn to
Prepositionn toPrepositionn to
Prepositionn to
 
Comparison of-adverbs
Comparison of-adverbsComparison of-adverbs
Comparison of-adverbs
 
Thermal management for Printed Circuit Boards
Thermal management for Printed Circuit BoardsThermal management for Printed Circuit Boards
Thermal management for Printed Circuit Boards
 
How i am surviving being bought out by
How i am surviving being bought out byHow i am surviving being bought out by
How i am surviving being bought out by
 

Similar a Information security

Similar a Information security (20)

Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
My presentation
My presentationMy presentation
My presentation
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and IT ACT
Cybercrime and IT ACTCybercrime and IT ACT
Cybercrime and IT ACT
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Information security

Notas del editor

  1. http://www.microsoft.com/security/default.aspxhttps://www.microsoft.com/security/pc-security/password-checker.aspx
  2. The rankings were created by SplashData who gathered the data from the millions of stolen passwords posted online by hackers in 2012 and ranked them in order of popularity http://gizmodo.com/5954372/the-25-most-popular-passwords-of-2012
  3. PGP Whole Disk Encryption - http://www.symantec.com/whole-disk-encryptionMicrosoft BitLocker - http://windows.microsoft.com/en-US/windows7/products/features/bitlocker
  4. http://www.microsoft.com/en-us/download/details.aspx?id=5201