SlideShare una empresa de Scribd logo
1 de 124
陳昇瑋 中央研究院 資訊科學研究所 世代的資安議題
What is Web 2.0? (Andy Budd) “ Putting The  We  in Web” “ … the Living Web ” --   Newsweek, 4/3/2006
Global Traffic Ranking
Web 2.0 Growth
Web 2.0: Definition Web 2.0 is the  network as platform , spanning all  connected devices ; Web 2.0 applications are those that make the most of the intrinsic advantages of that platform: delivering software as a  continually-updated service  that gets better the  more people use  it, consuming and remixing data from multiple sources, including individual users, while providing their own data and services in a form that allows  remixing  by others, creating network effects through an " architecture of participation ," and going beyond the page metaphor of Web 1.0 to deliver  rich user experiences . ( Figure courtesy of Irwin King )
Web 2.0: Interpretations ( Figure courtesy of Irwin King )
 
The Conversation Prism www.briansolis.com
Social Network Services (SNS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
e-mail Users  543 million Social Networking Users Social Spaces 484 million comScore Inc.  WSJ 10/18/07 August 2007
 
Facebook ,[object Object],[object Object],[object Object],[object Object],[object Object]
One Facebook Profile (out of 175 million)
MySpace ,[object Object],[object Object],[object Object],[object Object],[object Object]
Let’s Look … MySpace http:// www.myspace.com /
凡事有利必有弊 The top 10 social networking sites increased their audience of 46.8 million in 2005 to 68.8 million in April 2006, reaching  45% of active Web users.
Threats arisen from SNS Development ,[object Object]
Time to move sentry post to Web 2.0!
Potential Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ There is so much more personal information online."
1. Nothing is Ever Deleted from the Internet
Yahoo Site History 1996
Yahoo Site History 2000
Yahoo Site History 2005
Yahoo Site History 2009
Internet Data Never Be Deleted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An Online Quiz (for fun) yes yes yes
Blackmail claim stirs fears over Facebook
LTA suspends top junior players
Whether asked website to delete data that no longer wanted to be public? Outcome of request to delete data:
2. Information Leakage on SNS
Pseudonym != Anonymity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
非自願姓名洩露 ,[object Object],[object Object],[object Object],真實姓名為劉德榮?
案例分析:無名小站 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Involuntary Information Leakage in Social Network Services,” Ieng-Fat Lam, Kuan-Ta Chen, and Ling-Jyh Chen,  Proceedings of IWSEC 2008 .  http://mmnet.iis.sinica.edu.tw/publication_detail.html?key=lam08_wretch
使用者以真實姓名稱呼朋友傾向與被朋友以真實姓名稱呼的比率具有高度相關 使用者的姓名洩露比例與性別  ( 上圖 ) 及使用者年齡  ( 下圖 )  的關係 名稱種類 推測到的比例 暱稱 60% 全名 30% 名字  ( 不包括姓 ) 72% 全名或名字 78%
年齡及就學記錄的資訊洩露 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
使用者的就讀學校推測結果  ( 上圖 )  及平均推測範圍  ( 邊數 ) 使用者的年齡推測結果  ( 上圖 )  及平均推測範圍  ( 邊數 )
Sensitive Information Leakage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
無名小站情報分析事務所 http://mmnet.iis.sinica.edu.tw/proj/wretchinfo/
分析結果(範例一)
分析結果(範例二)
問卷結果  ( 一 )
問卷結果  ( 二 )
服務使用後續追蹤  ( 一 ) 姓名洩露程度的變化 有沒有任何姓名洩露
服務使用後續追蹤  ( 二 ) 姓名洩露程度與使用者反應的關係
服務使用後續追蹤  ( 三 ) 姓名洩露程度與使用者態度的關係
無名小站.文字繪 http://mmnet.iis.sinica.edu.tw/proj/tagart/
無名小站.文字繪
使用者不喜歡的標籤  ,[object Object],[object Object],[object Object],1.  姓名 , 2.  關係 , 3.  不雅綽號 , 4.  身份 , 5.  學經歷
Visual Shopping on Like.com
Content-based Image Retrieval (CBIR) Iguania Chelonia Amphisbaenia Alligatoridae   Alligatorinae   Crocodylidae   Cricosaura typica Xantusia vigilis Elseya dentata Glyptemys muhlenbergii Phrynosoma braconnieri Phrynosoma ditmarsi Phrynosoma taurus Phrynosoma douglassii Phrynosoma hernandesi Alligator mississippiensis Caiman crocodilus Crocodylus cataphractus Tomistoma schlegelii Crocodylus johnstoni *Purgatorio -- Canto XXXIII 64
3. Face Recognition ,[object Object],[object Object]
Face Recognition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4. Location Identification ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Parrot As The Feature
5. Image Tagging and Metadata ,[object Object],[object Object],流川楓 櫻木花道 三井
Image Tagging and Metadata ,[object Object],[object Object],[object Object]
6. Spamming ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
State-of-the-art Solution ,[object Object]
Text-based CAPTCHA
WHAT ARE THESE PICTURES OF? Image-based CAPTCHA
THE IMAGES NEED TO BE  RANDOMLY DISTORTED Image-based CAPTCHA
PLAYER 1 PLAYER 2 THE ESP GAME http://www.espgame.org/ GUESSING:   CAR GUESSING:   BOY GUESSING:   CAR SUCCESS! YOU AGREE ON CAR SUCCESS! YOU AGREE ON CAR GUESSING:   KID GUESSING:   HAT
© 2004 Carnegie Mellon University, all rights reserved. Patent Pending.
SAMPLE  LABELS BEACH CHAIRS SEA PEOPLE MAN WOMAN PLANT OCEAN TALKING WATER PORCH
15 MILLION LABELS   WITH 75,000 PLAYERS THE ESP GAME  IS FUN THERE ARE MANY PEOPLE THAT PLAY  OVER 20 HOURS A WEEK
SEARCH RESULTS OF  CAR
SEARCH RESULTS OF  DOG
SEARCH RESULTS OF  小甜甜布蘭妮
SEARCH RESULTS OF  GOOGLE
Having Fun = Work
Idea of Human Computation Take advantage of people’s desire to be entertained and perform useful tasks as a side effect
Human Computation as OCR System
7. Phishing and Social Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Statistics ,[object Object],[object Object]
Phishing Attacks
Phishing through Emails
Official vs Phishing Pages http://www.ebay.com.fake.cc/ http://www.ebay.com/
Spear Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anti-Phishing Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our Layout-based Detection Method ,[object Object]
Block Analysis
Layout Analysis
Match example ,[object Object]
Performance Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: Correct Classification
Example: Correct Classification
Example: Correct Classification
Example: Correct Classification
Example: Incorrect Classification
Example: Incorrect Classification
Example: Incorrect Classification
Example: Incorrect Classification
Our Local-Feature-based Detection Method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Page Matching (Classification)
[object Object],Performance Evaluation
Phishgig 1. Installed in Firefox 3.0.1 2. Live Status 3. Protected Pages Management http://mmnet.iis.sinica.edu.tw/proj/phishgig/
Phishgig in Action 1. Legitimate eBay login page 2. Fake eBay login page
8. SNS Aggregators ,[object Object],[object Object],[object Object]
9. XSS, Viruses, and Worms ,[object Object],[object Object],[object Object]
10. Information Leakage due to  Network Infiltration ,[object Object],[object Object],[object Object],[object Object]
Information Leakage due to Network Infiltration ,[object Object],[object Object],[object Object],[object Object],[object Object]
11. Reputation Slander though Identity Theft ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
12. Cyberstalking ,[object Object],[object Object],[object Object]
Micro blogging
Twitter is  HOT !
Twitter Vision 3D
Twitter Map
看到許許多多的資安問題, 我們能做些什麼?
 
Efforts to Cope with Threats (1) ,[object Object],[object Object],[object Object],[object Object]
Privacy Control Settings of Facebook
However, … ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Efforts to Cope with Threats (2) ,[object Object],K-Same: thwarts face recognition while many facial details remain.
Efforts to Cope with Threats (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rating Score Aggregation ,[object Object],5 0.1 8 2 0.3 7 5 0.1 6 1 0.6 5 4 0.9 4 3 0.3 3 5 0.4 2 3 1 1 Rating T(i) i TVBS Counting Method TVBS outputs 3 !! Counting method outputs 5 !!
Collusion-Resistant Impeachment System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our Proposed Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],outside edge inside edge
Performance Evaluation
Efforts to Cope with Threats (4) ,[object Object],[object Object],[object Object],[object Object],[object Object]
TAKE HOME MESSAGES ,[object Object],[object Object],[object Object]
結語 ,[object Object],[object Object],[object Object],[object Object]
謝謝各位! 陳昇瑋 中央研究院 資訊科學研究所 http://www.iis.sinica.edu.tw/~swc
Questions

Más contenido relacionado

Destacado

資料科學家未曾公開之資安研究事件簿
資料科學家未曾公開之資安研究事件簿資料科學家未曾公開之資安研究事件簿
資料科學家未曾公開之資安研究事件簿Sheng-Wei (Kuan-Ta) Chen
 
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...Sheng-Wei (Kuan-Ta) Chen
 
20160829 夢想,Loading...
20160829 夢想,Loading...20160829 夢想,Loading...
20160829 夢想,Loading...羅左欣
 
資料科學如何幫我們更瞭解捐款人?
資料科學如何幫我們更瞭解捐款人?資料科學如何幫我們更瞭解捐款人?
資料科學如何幫我們更瞭解捐款人?Sheng-Wei (Kuan-Ta) Chen
 
20141214擔任活動執秘應注意之事項
20141214擔任活動執秘應注意之事項20141214擔任活動執秘應注意之事項
20141214擔任活動執秘應注意之事項羅左欣
 
R統計軟體簡介
R統計軟體簡介R統計軟體簡介
R統計軟體簡介Person Lin
 
DSP資料科學教學模式分享
DSP資料科學教學模式分享DSP資料科學教學模式分享
DSP資料科學教學模式分享DSP智庫驅動
 
Neural Language Model Tutorial
Neural Language Model Tutorial Neural Language Model Tutorial
Neural Language Model Tutorial Mark Chang
 
如何靠自學成為工程師
如何靠自學成為工程師如何靠自學成為工程師
如何靠自學成為工程師Joseph Lu
 
計算社會科學初探- 當電腦科學家遇上社會科學
計算社會科學初探-當電腦科學家遇上社會科學計算社會科學初探-當電腦科學家遇上社會科學
計算社會科學初探- 當電腦科學家遇上社會科學Sheng-Wei (Kuan-Ta) Chen
 
20170118 社團負責人課程
20170118 社團負責人課程20170118 社團負責人課程
20170118 社團負責人課程羅左欣
 
第二堂 學習 Java 語法 (1) Java 歷史與程序開發
第二堂 學習 Java 語法 (1) Java 歷史與程序開發第二堂 學習 Java 語法 (1) Java 歷史與程序開發
第二堂 學習 Java 語法 (1) Java 歷史與程序開發力中 柯
 
大數據獲利模式 Ch 2
大數據獲利模式 Ch 2大數據獲利模式 Ch 2
大數據獲利模式 Ch 2Hans Shih
 
藏頭詩產生器
藏頭詩產生器藏頭詩產生器
藏頭詩產生器Mark Chang
 

Destacado (20)

資料科學家未曾公開之資安研究事件簿
資料科學家未曾公開之資安研究事件簿資料科學家未曾公開之資安研究事件簿
資料科學家未曾公開之資安研究事件簿
 
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
Crowdsourcing beyond Mechanical Turk: Building Crowdmining Services for Your ...
 
Borland C++Builder 進階課程
Borland C++Builder 進階課程Borland C++Builder 進階課程
Borland C++Builder 進階課程
 
Inside VCL
Inside VCLInside VCL
Inside VCL
 
Borland C++Builder 入門課程
Borland C++Builder 入門課程Borland C++Builder 入門課程
Borland C++Builder 入門課程
 
20160829 夢想,Loading...
20160829 夢想,Loading...20160829 夢想,Loading...
20160829 夢想,Loading...
 
Network and Multimedia QoE Management
Network and Multimedia QoE ManagementNetwork and Multimedia QoE Management
Network and Multimedia QoE Management
 
一位年輕探索者的建議
一位年輕探索者的建議一位年輕探索者的建議
一位年輕探索者的建議
 
當學術研究者遇見線上遊戲
當學術研究者遇見線上遊戲當學術研究者遇見線上遊戲
當學術研究者遇見線上遊戲
 
資料科學如何幫我們更瞭解捐款人?
資料科學如何幫我們更瞭解捐款人?資料科學如何幫我們更瞭解捐款人?
資料科學如何幫我們更瞭解捐款人?
 
20141214擔任活動執秘應注意之事項
20141214擔任活動執秘應注意之事項20141214擔任活動執秘應注意之事項
20141214擔任活動執秘應注意之事項
 
R統計軟體簡介
R統計軟體簡介R統計軟體簡介
R統計軟體簡介
 
DSP資料科學教學模式分享
DSP資料科學教學模式分享DSP資料科學教學模式分享
DSP資料科學教學模式分享
 
Neural Language Model Tutorial
Neural Language Model Tutorial Neural Language Model Tutorial
Neural Language Model Tutorial
 
如何靠自學成為工程師
如何靠自學成為工程師如何靠自學成為工程師
如何靠自學成為工程師
 
計算社會科學初探- 當電腦科學家遇上社會科學
計算社會科學初探-當電腦科學家遇上社會科學計算社會科學初探-當電腦科學家遇上社會科學
計算社會科學初探- 當電腦科學家遇上社會科學
 
20170118 社團負責人課程
20170118 社團負責人課程20170118 社團負責人課程
20170118 社團負責人課程
 
第二堂 學習 Java 語法 (1) Java 歷史與程序開發
第二堂 學習 Java 語法 (1) Java 歷史與程序開發第二堂 學習 Java 語法 (1) Java 歷史與程序開發
第二堂 學習 Java 語法 (1) Java 歷史與程序開發
 
大數據獲利模式 Ch 2
大數據獲利模式 Ch 2大數據獲利模式 Ch 2
大數據獲利模式 Ch 2
 
藏頭詩產生器
藏頭詩產生器藏頭詩產生器
藏頭詩產生器
 

Similar a Web 2.0世代的資安議題

Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
Essay On Wuthering Heights.pdf
Essay On Wuthering Heights.pdfEssay On Wuthering Heights.pdf
Essay On Wuthering Heights.pdfVicki Ardon
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
So-Sial Networking
So-Sial NetworkingSo-Sial Networking
So-Sial NetworkingAlanGun Alan
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Choose The Best Research Paper
Choose The Best Research PaperChoose The Best Research Paper
Choose The Best Research PaperJen Cloud
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
020908 Handshaw Workshop
020908 Handshaw Workshop020908 Handshaw Workshop
020908 Handshaw Workshoptonyodriscoll
 
Identity, privacy & the Open Web
Identity, privacy & the Open WebIdentity, privacy & the Open Web
Identity, privacy & the Open Webgueste2dc25
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
The social-implications-of-computing
The social-implications-of-computingThe social-implications-of-computing
The social-implications-of-computinghoho776
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
 
Yes, I DO Mind the Gap
Yes, I DO Mind the GapYes, I DO Mind the Gap
Yes, I DO Mind the GapTara Hunt
 
Paper Writing Website. Affordable Papers
Paper Writing Website. Affordable PapersPaper Writing Website. Affordable Papers
Paper Writing Website. Affordable PapersStephanie Barker
 
Mind The Gap - ConnectNow
Mind The Gap - ConnectNowMind The Gap - ConnectNow
Mind The Gap - ConnectNowTara Hunt
 
025 Theme Essay Example Literary Examples Samples Writing Analys
025 Theme Essay Example Literary Examples Samples Writing Analys025 Theme Essay Example Literary Examples Samples Writing Analys
025 Theme Essay Example Literary Examples Samples Writing AnalysJasmine Dixon
 
6 Strategy Paper Templates - Free Samples, Example
6 Strategy Paper Templates - Free Samples, Example6 Strategy Paper Templates - Free Samples, Example
6 Strategy Paper Templates - Free Samples, ExampleKerry Lewis
 

Similar a Web 2.0世代的資安議題 (20)

Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
sih_ppt2.pptx
sih_ppt2.pptxsih_ppt2.pptx
sih_ppt2.pptx
 
Essay On Wuthering Heights.pdf
Essay On Wuthering Heights.pdfEssay On Wuthering Heights.pdf
Essay On Wuthering Heights.pdf
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
So-Sial Networking
So-Sial NetworkingSo-Sial Networking
So-Sial Networking
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Choose The Best Research Paper
Choose The Best Research PaperChoose The Best Research Paper
Choose The Best Research Paper
 
News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
020908 Handshaw Workshop
020908 Handshaw Workshop020908 Handshaw Workshop
020908 Handshaw Workshop
 
Mind The Gap
Mind The GapMind The Gap
Mind The Gap
 
Identity, privacy & the Open Web
Identity, privacy & the Open WebIdentity, privacy & the Open Web
Identity, privacy & the Open Web
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
The social-implications-of-computing
The social-implications-of-computingThe social-implications-of-computing
The social-implications-of-computing
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Yes, I DO Mind the Gap
Yes, I DO Mind the GapYes, I DO Mind the Gap
Yes, I DO Mind the Gap
 
Paper Writing Website. Affordable Papers
Paper Writing Website. Affordable PapersPaper Writing Website. Affordable Papers
Paper Writing Website. Affordable Papers
 
Mind The Gap - ConnectNow
Mind The Gap - ConnectNowMind The Gap - ConnectNow
Mind The Gap - ConnectNow
 
025 Theme Essay Example Literary Examples Samples Writing Analys
025 Theme Essay Example Literary Examples Samples Writing Analys025 Theme Essay Example Literary Examples Samples Writing Analys
025 Theme Essay Example Literary Examples Samples Writing Analys
 
6 Strategy Paper Templates - Free Samples, Example
6 Strategy Paper Templates - Free Samples, Example6 Strategy Paper Templates - Free Samples, Example
6 Strategy Paper Templates - Free Samples, Example
 

Más de Sheng-Wei (Kuan-Ta) Chen

Más de Sheng-Wei (Kuan-Ta) Chen (6)

人工智慧在台灣: 產業轉型的契機與挑戰
人工智慧在台灣: 產業轉型的契機與挑戰人工智慧在台灣: 產業轉型的契機與挑戰
人工智慧在台灣: 產業轉型的契機與挑戰
 
台灣人工智慧學校介紹
台灣人工智慧學校介紹台灣人工智慧學校介紹
台灣人工智慧學校介紹
 
聰明公益資訊平台
聰明公益資訊平台聰明公益資訊平台
聰明公益資訊平台
 
從 Project Theta 到台灣人工智慧學校
從 Project Theta 到台灣人工智慧學校從 Project Theta 到台灣人工智慧學校
從 Project Theta 到台灣人工智慧學校
 
從大數據走向人工智慧
從大數據走向人工智慧從大數據走向人工智慧
從大數據走向人工智慧
 
網路購書大數據– 給出版者的洞察分析
網路購書大數據– 給出版者的洞察分析網路購書大數據– 給出版者的洞察分析
網路購書大數據– 給出版者的洞察分析
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Web 2.0世代的資安議題

Notas del editor

  1. The conversation map is a representation of Social services and conversation
  2. Especially when almost as many people are on social networks than using emails. Can we play then in those spaces? NEXT
  3. 人工檢查,抽樣 1000 ,準確率 74% (738) , error 大部分也為暱稱。 78% 再 74% = 58% ( 超過一半 ) 72% 再 74% = 53% ( 超過一半 ) 30% 再 74% = 22% (5 分之一 )
  4. 人工檢查,抽樣 1000 ,準確率 74% (738) , error 大部分也為暱稱。 78% 再 74% = 58% ( 超過一半 ) 72% 再 74% = 53% ( 超過一半 ) 30% 再 74% = 22% (5 分之一 )
  5. h