Upload
hemant-mittal
View
80
Download
0
Tags:
Embed Size (px)
Citation preview
A SEMINAR PRESENTATION ON
BY :HEMANT MITAL
04/17/23
04/17/23
04/17/23
04/17/23
What else?
● Most Android devices are vulnerable.
● iOS and Mac OSX are not vulnerable.
-but some 3rd party iOS apps are.
● Most Linux browsers are probably
vulnerable.
WHAT ELSE ?• IP phones
• Routers
• Medical devices
• Smart TV sets
• embedded devices
Safe(r) Browsers● Firefox, Chrome, and IE (on Windows) use
the Microsoft implementation of SSL not OpenSSL.
● Internet Informations Server/Services (IIS) are not vulnerable.
What is Information Security doing?
● Continuous monitoring for this vulnerability with both IDS and IPS devices.
● Vulnerability scans. - not as effective since it's a snapshot in time but a good starting point.