1 / 14

Intro to Cybersecurity Hacksplaining

Oregon State University Business Information Systems. Intro to Cybersecurity Hacksplaining. Meet Our Team. Isabella Ko-Chia Muhammad Preethi Sarah. Information Sourced from:. Hacksplaining (https://www.hacksplaining.com). Go to www.hackplaining.com.

bhoyle
Download Presentation

Intro to Cybersecurity Hacksplaining

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Oregon State University Business Information Systems Intro to Cybersecurity Hacksplaining

  2. Meet Our Team Isabella Ko-Chia Muhammad Preethi Sarah

  3. Information Sourced from: Hacksplaining (https://www.hacksplaining.com)

  4. Go to www.hackplaining.com

  5. Click on Lessons Click on “Lessons”

  6. Choose 3 Vulnerabilities to Explore

  7. Discuss in groups...

  8. Cross-Site Scripting • What is Cross-site scripting (XSS)? • What is identity theft?

  9. Cross-Site Scripting • Cross-site scripting (XSS) is one of the most common methods hackers use to attack websites. • Identity theft occurs when the user enters confidential information using malicious code • When someone deliberately acquires and uses a person’s personal information without permission for their personal gain

  10. Clickjacking • What is clickjacking? • What could a determined hacker do with a clickjacking attack?

  11. Clickjacking • Clickjacking attacks trick web users into performing an action they did not intend, typically by rendering an invisible page element on top of the action the user thinks they are performing. • With Clickjacking, an attacker can: • Harvest login credentials • Trick users into turning on their webcam or microphone • Promote online scams • Spread malware

  12. Unencrypted Communication • What is transport layer security (TLS)? • What is encryption? • What does HTTPS stand for?

  13. Unencrypted Communication • Transport Layer Security (TLS) is a cryptographic protocol that allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering. • Encryption prevents an attacker from intercepting traffic sent between you and your users. • HyperText Transfer Protocol Secure

  14. Sign-Up For Hacksplaining to Explore More!

More Related