Downlaod File

Download Report

Transcript Downlaod File

Introduction
 The Purpose
 The Questions
 Thesis Statement
 Determination of Hotmail Security Risks
 Conclusions

Hotmail was one of the most common
form of web emails during the time when
the Internet was just starting.
 Hotmail was originally a combination of
FreeBSD and Solaris operating systems
 Hotmail became part of the MSN group
of services


Hotmail was involved in a security issue that allowed
anybody to log into any Hotmail account - it was "the
most widespread security incident in the history of the
Web.“

Hotmail service was in security mess again in 2001 by
computer hackers who discovered that anyone could log
into their Hotmail account.

Web sites around the globe published exact descriptions
allowing tens-of-thousands of hackers to run rampantly
across Hotmail.

In 2004 introduced upgraded versions of their email
services with greater speed, security, and advanced
features.
To point out awareness of the security risks
that an individual users or corporate users
to that effect can be affected in the use of
Hotmail.
2. To inform the users about security services
and features in the use of Hotmail and
make the users be aware of it from corrupt
hackers.
3. To advice and counsel the Hotmail users
and incoming consumers about ways
towards confident methods at avoiding
1.

The basis for the understanding of security
risks in the use of web based email and
messaging systems lies in the understanding
of the key issues that relates to the service
providers such as Hotmail.

Recognition of the pros and cons, its
operating history and the various external
comments and critiques of the applications
systems of Hotmail,

The essential queries to seek in this study are to find out the following specific
inquiries:
›
What are the risks that Hotmail users had faced?
›
What are hotmail security flaws that had been uncovered over the years of
operation?
›
What had been the solutions to the security defects that can be used by consumers
to avoid being trapped in the security mess of Hotmail?
›
What are the better ways to avoid being affected by the security flaws while using
Hotmail?

The research determines generally the
security risk issues on the use of hotmail.

It further determines and offers ways and
means in protecting users on the
confidentiality of his personal data as
well as the leakage of his personal and
private communications.

Hotmail at 90% user following is the world’s second
largest email and messenger provider.

At high traffic volume, Microsoft's MSN Hotmail had
security flaw wherein free email service allowing users
to log on from any Web page can easily be done.

Computer security experts find it imperative to create
more secure method to restrict access through the
Hotmail home page.

The modified version of Hotmail allow access any
account without a password.

The modified version of Hotmail allow
access any account without a password.

Hotmail at 90% user following is the world’s
second largest email and messenger
provider.

At high traffic volume, Microsoft's MSN
Hotmail had security flaw wherein free
email service allowing users to log on from
any Web page can easily be done.
Computer security experts find it
imperative to create more secure
method to restrict access through the
Hotmail home page.
 Microsoft in tandem with Hotmail had
new system that was as well security-risk
infested.
 The Hotmail problem exploited a
weakness in the login script for a
particular Hotmail server.


The problem reappeared because Microsoft
failed to fix another server.

It is easy to exploit the kind of security
weakness where a combination on a little
knowledge of another programming
language, a web page author can steal the
usernames and passwords in Hotmail.

Computer security researcher (Valotta) has
found another flaw in Microsoft Corp's widely
used Internet Explorer browser that he said
could let hackers steal credentials to access
Hotmail. He indentified the technique as

Microsoft expressed sternly that there is but
little risk a hacker could succeed in a realworld cookiejacking scam.

To click and drag items around the page
and the attacker would need to target a
cookie from the website that the user was
already logged into.

Another security flaw attributed to Hotmail
is termed as a cross-site scripting

It forms into a “worm” that steals e-mail addresses
from Hotmail users' accounts, captures credit card
numbers, or installs Trojan horse programs.

Cross-site scripting attackers has easy access to personal
account or financial information or control over a remote
machine.

Attackers could run nasty code on the computer of a
Hotmail user who opened an e-mail containing the
malicious ActiveX control. .

.
With the development of informatics,
there is a corresponding increase in
security risk to face.
 Hotmail as one of the leading service
providers of email and messaging
security has gone through series of
security issues.

The users should know how one must
deal correctly with Hotmail – by knowing
how one can get the desired benefits
from its service offerings and features.
 Individual or corporate users are
susceptible to hacking but armed with
the knowledge to countermand will
eliminate the security risks that goes with
hotmail use.

Microsoft’s simple safety precautions for
effective Hotmail operations are:
 Get rid of spam
 Clear out unwanted email
 Recover your account if it gets hacked
 Be safer when you use a public computer
How to avoid being defrauded
 Change your passwords every 90 days
 Use different passwords for various internet
log-ins
 Do not open unsolicited email attachments
and links
Thank you
for your
kind listening!