The document provides an overview of computer security and privacy. It discusses the history of computer security from the 1960s to present day, highlighting some famous security problems such as the Morris worm in 1988. It defines key computer security terms and concepts such as threats, vulnerabilities, and countermeasures. It also examines different types of computer security attacks including hacking, denial of service attacks, malware, viruses, worms, and Trojan horses. The document outlines security measures related to physical security, network security, and the importance of the human factor in computer security.
This document provides an overview of computer security and privacy. It begins with defining key terms like security, privacy, threats, and vulnerabilities. It then discusses the evolution of computer security, highlighting important early cases from the 1970s-1990s. The document outlines different types of computer security like security by design, secure operating systems, and secure coding. It also covers privacy issues and some salient computer security cases from Ethiopia and globally to demonstrate the history and importance of the topic.
The document discusses security in information technology. It covers topics such as what security is, why it is needed for IT, common security threats to IT systems, both physical and virtual, and how to mitigate those threats. It also addresses data and cyber security, practical applications of security in IT systems, advantages of security, and challenges and limitations of implementing security. The overall goal is to help readers understand the need for IT security and how to protect physical and digital assets from various threats.
The document discusses various topics relating to computer security and privacy including definitions, types of attacks and threats, vulnerabilities, countermeasures, physical security, and the human factor. It provides an overview of security concepts, outlines common computer security attacks and their categories, and discusses prevention and recovery strategies. The document also covers specific threats like viruses, worms, trojans, and describes anti-virus functions.
The document discusses security in information technology. It covers what security is, why it is needed for IT, physical and virtual security threats to IT environments, and how to avoid these threats. Specific topics covered include data security, cyber security, firewalls, access controls, encryption, and other methods to protect against threats like viruses, hacking, and data theft. The goal is to explain the importance of security for protecting IT systems, data, and infrastructure from both physical and virtual risks.
IT Security for the Physical Security Professionalciso_insights
This document provides an overview of an IT security presentation for physical security professionals. The agenda includes introductions, an overview of IT security concepts and terminology, technical topics, and ways physical security professionals can help with IT security. Some key points covered include changing threats like identity theft and phishing, common attacks like man-in-the-middle and denial of service, and risks from things like laptop theft, wireless networks, and spyware. The presentation aims to help physical security professionals understand basic IT security principles and how they can support efforts to protect electronic information and networks.
Cyber security and data protection are important in the digital era. Cyber security protects information and data from unauthorized access on the internet. It ensures only authorized people can access data. There are various security threats like malware, phishing, and man-in-the-middle attacks that can compromise data. Cyber laws like the IT Act 2000 and its 2008 amendment provide legal framework for electronic transactions and define cyber crimes and penalties. The Data Protection Act 2018 also governs how personal information is collected and used by organizations.
Some key challenges of computer security include:
- Rapidly evolving threats - As technology advances, so do the methods used by hackers and cybercriminals. It can be difficult for security defenses to keep up.
- Complex systems - Modern IT infrastructures are highly complex with many interconnected systems, software, devices, users, etc. This complexity introduces many potential vulnerabilities.
- Human element - Many breaches are caused by human error, negligence or malicious insiders. Educating and training all users can be challenging.
- Costs of security - Implementing robust security controls requires significant resources. There is often a tradeoff between security and other priorities like functionality, cost and user experience.
- Privacy vs
This document summarizes an example of a large-scale computer security attack that compromised over 75,000 computers belonging to 2500 companies around the world. The perpetrators lured employees to open infected email attachments, allowing their computers to be taken over by a large botnet called Kneber. Once in control of a computer, the attackers searched for sensitive information and passwords. They then used the compromised computers to spread the infection further via other networks and machines. The sophisticated and coordinated nature of the attack demonstrated the high level of skill of the criminal groups involved.
This document provides an overview of computer security and privacy. It begins with defining key terms like security, privacy, threats, and vulnerabilities. It then discusses the evolution of computer security, highlighting important early cases from the 1970s-1990s. The document outlines different types of computer security like security by design, secure operating systems, and secure coding. It also covers privacy issues and some salient computer security cases from Ethiopia and globally to demonstrate the history and importance of the topic.
The document discusses security in information technology. It covers topics such as what security is, why it is needed for IT, common security threats to IT systems, both physical and virtual, and how to mitigate those threats. It also addresses data and cyber security, practical applications of security in IT systems, advantages of security, and challenges and limitations of implementing security. The overall goal is to help readers understand the need for IT security and how to protect physical and digital assets from various threats.
The document discusses various topics relating to computer security and privacy including definitions, types of attacks and threats, vulnerabilities, countermeasures, physical security, and the human factor. It provides an overview of security concepts, outlines common computer security attacks and their categories, and discusses prevention and recovery strategies. The document also covers specific threats like viruses, worms, trojans, and describes anti-virus functions.
The document discusses security in information technology. It covers what security is, why it is needed for IT, physical and virtual security threats to IT environments, and how to avoid these threats. Specific topics covered include data security, cyber security, firewalls, access controls, encryption, and other methods to protect against threats like viruses, hacking, and data theft. The goal is to explain the importance of security for protecting IT systems, data, and infrastructure from both physical and virtual risks.
IT Security for the Physical Security Professionalciso_insights
This document provides an overview of an IT security presentation for physical security professionals. The agenda includes introductions, an overview of IT security concepts and terminology, technical topics, and ways physical security professionals can help with IT security. Some key points covered include changing threats like identity theft and phishing, common attacks like man-in-the-middle and denial of service, and risks from things like laptop theft, wireless networks, and spyware. The presentation aims to help physical security professionals understand basic IT security principles and how they can support efforts to protect electronic information and networks.
Cyber security and data protection are important in the digital era. Cyber security protects information and data from unauthorized access on the internet. It ensures only authorized people can access data. There are various security threats like malware, phishing, and man-in-the-middle attacks that can compromise data. Cyber laws like the IT Act 2000 and its 2008 amendment provide legal framework for electronic transactions and define cyber crimes and penalties. The Data Protection Act 2018 also governs how personal information is collected and used by organizations.
Some key challenges of computer security include:
- Rapidly evolving threats - As technology advances, so do the methods used by hackers and cybercriminals. It can be difficult for security defenses to keep up.
- Complex systems - Modern IT infrastructures are highly complex with many interconnected systems, software, devices, users, etc. This complexity introduces many potential vulnerabilities.
- Human element - Many breaches are caused by human error, negligence or malicious insiders. Educating and training all users can be challenging.
- Costs of security - Implementing robust security controls requires significant resources. There is often a tradeoff between security and other priorities like functionality, cost and user experience.
- Privacy vs
This document summarizes an example of a large-scale computer security attack that compromised over 75,000 computers belonging to 2500 companies around the world. The perpetrators lured employees to open infected email attachments, allowing their computers to be taken over by a large botnet called Kneber. Once in control of a computer, the attackers searched for sensitive information and passwords. They then used the compromised computers to spread the infection further via other networks and machines. The sophisticated and coordinated nature of the attack demonstrated the high level of skill of the criminal groups involved.
This document provides an introduction and overview of computer security and privacy. It discusses how computer security aims to protect information from unauthorized access while allowing intended use. Privacy involves protecting personal information. The document then covers physical security, network security, basic security objectives of confidentiality, integrity and availability. It provides examples of security policies, mechanisms, and goals of prevention, detection and recovery. Finally, it discusses the brief history of computer security and privacy and covers early efforts to address these issues through standards, legislation and security controls.
This document provides a detailed syllabus for an Information Security course. It includes 5 units: Introduction, Security Investigation, Security Analysis, Logical Design, and Physical Design. The Introduction unit covers the history of information security and computer security. It defines key concepts like confidentiality, integrity, availability, and the CIA triangle. It also discusses security models and the components of an information system. The other units will cover topics like risk management, access control, security standards, cryptography, and physical security controls.
This document provides a detailed syllabus for an Information Security course. It covers 5 units:
1) Introduction - Provides a history of information security and an overview of key concepts like the CIA triangle of Confidentiality, Integrity and Availability.
2) Security Investigation - Covers the need for security, threats, attacks, and legal/ethical issues.
3) Security Analysis - Focuses on risk management, access controls, and information flow.
4) Logical Design - Addresses security policies, standards, security architecture design and planning continuity.
5) Physical Design - Covers security technologies, intrusion detection systems, cryptography, access controls, physical security and personnel security
This document discusses various computer security issues and risks. It covers topics like computer crimes like theft, hacking, and software piracy. It also discusses how to reduce security risks through measures like passwords, firewalls, encryption, backups, and physical access restrictions. Finally, it discusses challenges balancing security, privacy, and ethics with new technologies.
The document discusses the importance of computer forensics and computer security. It notes that as technology advances, security needs to advance as well to protect vital information from unauthorized access. Computer forensics is used to investigate cyber crimes and digital evidence in order to strengthen legal systems and network security. Both computer forensics and computer security are crucial fields within IT that work together to develop more efficient security measures and prevent cyber crimes from increasing.
This document discusses privacy, security, and ethics as they relate to technology and personal data. It addresses threats to privacy from large databases, private networks, and the internet. It also covers security threats from computer criminals like hackers and issues around computer crime. Finally, it discusses ethics around copyright, software piracy, and plagiarism as shaped by digital technologies.
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxNune SrinivasRao
Cryptography and network security are important topics. Cryptography involves encrypting messages to make them unintelligible during transmission and then decrypting them upon arrival. The objectives of information security are confidentiality, integrity, availability, and nonrepudiation. As technology has advanced, the need for computer and network security has increased. Modern attacks can be automated to target many systems quickly. Collecting and sharing personal data also raises privacy concerns. To address these issues, organizations use various security approaches like trusted systems and security models.
Cat21:Development Mangement Information SystemsSimeon Ogao
Computer systems face security risks like trespassing, theft, alteration of information, and cyber crimes. To address these concerns, organizations must implement security measures to protect their data and systems. These include physical security of computer hardware, restricting access to data and software, using passwords and access codes, conducting security audits, and keeping backup files in secure locations away from the main system. Proper security controls and regular reviews are needed to safeguard computer systems and information from damage or unauthorized access.
The document discusses the evolution of computer security from the 1960s to present day. It covers key events like the creation of ARPANET and the internet, as well as security concerns that emerged with databases, networks, malware, and e-commerce. Examples of early computer attacks are provided, like the Morris worm. The goals, aspects, and components of computer security are defined, including vulnerabilities, threats, countermeasures, and security controls. Physical security principles are also outlined.
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
Running head: CYBERSECURITY IN FINANCIAL DOMAIN 1
CYBERSECURITY IN FINANCIAL DOMAIN 6
Cyber Security in Financial Domain
Introduction
The latest IT sector is faced with several risks. The revolution has a chance with the manufactures of digital supply networks and smart technologies. The revolution is growing at a fast rate which leads to the increase of cyber-attacks. The interconnection of the digital systems leads to the significant rise of cyber-attacks. Some of the firms faced with cyber-attacks are not ready to face the issue of cyber-crime. IT firms need to be organized, vigilant, and resilient to deal with any risk that may arise (Evans, 2019). They need to put strict measures that will help them tackle any issue on its initial before it destroys different organizations.
Background of the problem
Cybersecurity is also referred to as information technology. Cybersecurity is the process which involves protecting networks, systems, and programs from digital attacks. Cybersecurity has been designed in a way that people try to gain access to applications without easily. Cybersecurity attacks intend to manipulate data, interrupt the functionality of the cyber, destroy digitally stored data as well as demand for money from data owners.
The attacks tend to gain access within the information technology so as they can easily manipulate the data. Most industries today have been affected by cybersecurity attacks. Their information has been managed, leading to loss of money. According to Singer and Friedman (2014), coming up with useful cybersecurity measure is a challenge since it requires a lot of time and attention to implement them. Cybersecurity criminals have also evolved and devised modern means and innovations on how they attack industries.
Cybersecurity can be termed as coming up with different practices into the existing systems to ensure credibility, availability, and integrity of information. The challenges faced with IT organizations can be solved with better practices and measures put in place. Organizations use advanced technology to detect any form of attack. The systems are well protected in a way that they cannot be manipulated. The firms will be on the safe side as they will not lose any data to hackers. They will also transform their technology to a new level.
The threats have been said to come in different forms such as ransom ware, malware attacks, and phishing and exploit kits. They have become more complicated due to the growing technologies in organizations. The IT firms have revolutionized over the years up to date. They use the latest technology, such as the use of robots, to make the work easier. Once these threats attack the machines, the machine fails hence will not be valid.
The organizations, therefore, need to come up with the latest techniques that will help them protect their technology. The m ...
In this presentation, we talk about the need for cyber security in organizations to protect important data and prevent attacks on the systems installed in an organization.
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
The document discusses several topics related to computer use and security, including privacy issues, computer crimes, security measures, ergonomics, and health concerns. Specifically, it defines privacy and discusses issues around large databases and private networks. It also defines computer security and different types of computer crimes. The document outlines some security measures like passwords, antivirus software, firewalls, and backups. It defines ergonomics and its importance in reducing fatigue. Finally, it discusses the importance of considering mental and physical health for computer users.
1. The document discusses cyber security issues related to business networks, the internet, and future trends. It covers topics like viruses, hackers, identity theft, spyware, firewalls, passwords, and disaster recovery.
2. Mechanisms for protecting against cyber threats are examined, including keeping software updated, using antivirus software, installing spyware protection, implementing firewalls, and creating strong passwords.
3. Looking ahead, the future of cyber security will be shaped by emerging technologies, more internet-connected devices, increased amounts of personal data online, and growth in cloud computing services. Security challenges will rise as younger users and billions more devices come online.
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
Understand Ethics and Security in the Programming ProcessCasey Robertson
This document discusses ethics and security considerations in computer programming and use. It covers topics like computer ethics, privacy issues related to data collection, laws around technology and privacy in the US, implications of computer use like ergonomics and environmental concerns, protecting software and data through copyright and preventing piracy and viruses, and illegal acts like hacking, cracking, and phishing. Organizations focused on computer ethics and society are also mentioned.
The document outlines an information security workshop presentation on the scope and importance of information security. It discusses 10 key domains of information security knowledge including access control, application security, risk management, cryptography, operations security, physical security, security architecture, telecommunications, and networks. The presenter has 10 years of IT consulting experience and various security certifications. The goals are to raise awareness of information security and the need for regional cooperation such as a Pacific Computer Emergency Response Team.
This chapter discusses ethics, privacy, information security threats, and methods for protecting information resources. It describes major ethical issues related to information technology like privacy, accuracy, property, and accessibility. It outlines threats to information security such as hacking, viruses, spyware, and social engineering. It also explains methods for protecting information systems, including risk management, access controls, network security tools like firewalls and encryption, backup and disaster recovery plans, and information systems auditing.
The document discusses computer security and threats. It defines computer security as protecting computer systems and information from unwanted access, damage, or modification. It describes three types of computer security: hardware security, software/data security, and network security. It also discusses various threats like viruses, Trojans, hackers, and natural disasters. It provides checklists and security measures like backups, antivirus software, firewalls, and access controls to protect against these threats.
ICT refers to the technologies required for information processing, including electronic computers, communication devices, and software applications. These technologies allow for information to be converted, stored, processed, transmitted, and retrieved from anywhere at any time. Key aspects of ICT include computers, the internet, email, video conferencing, phones, fax machines, radio, television, and satellites. ICT has evolved over time from early counting tools to modern computers and is now widely used in education, banking, industry, e-commerce, and other areas of daily life.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
This document provides an introduction and overview of computer security and privacy. It discusses how computer security aims to protect information from unauthorized access while allowing intended use. Privacy involves protecting personal information. The document then covers physical security, network security, basic security objectives of confidentiality, integrity and availability. It provides examples of security policies, mechanisms, and goals of prevention, detection and recovery. Finally, it discusses the brief history of computer security and privacy and covers early efforts to address these issues through standards, legislation and security controls.
This document provides a detailed syllabus for an Information Security course. It includes 5 units: Introduction, Security Investigation, Security Analysis, Logical Design, and Physical Design. The Introduction unit covers the history of information security and computer security. It defines key concepts like confidentiality, integrity, availability, and the CIA triangle. It also discusses security models and the components of an information system. The other units will cover topics like risk management, access control, security standards, cryptography, and physical security controls.
This document provides a detailed syllabus for an Information Security course. It covers 5 units:
1) Introduction - Provides a history of information security and an overview of key concepts like the CIA triangle of Confidentiality, Integrity and Availability.
2) Security Investigation - Covers the need for security, threats, attacks, and legal/ethical issues.
3) Security Analysis - Focuses on risk management, access controls, and information flow.
4) Logical Design - Addresses security policies, standards, security architecture design and planning continuity.
5) Physical Design - Covers security technologies, intrusion detection systems, cryptography, access controls, physical security and personnel security
This document discusses various computer security issues and risks. It covers topics like computer crimes like theft, hacking, and software piracy. It also discusses how to reduce security risks through measures like passwords, firewalls, encryption, backups, and physical access restrictions. Finally, it discusses challenges balancing security, privacy, and ethics with new technologies.
The document discusses the importance of computer forensics and computer security. It notes that as technology advances, security needs to advance as well to protect vital information from unauthorized access. Computer forensics is used to investigate cyber crimes and digital evidence in order to strengthen legal systems and network security. Both computer forensics and computer security are crucial fields within IT that work together to develop more efficient security measures and prevent cyber crimes from increasing.
This document discusses privacy, security, and ethics as they relate to technology and personal data. It addresses threats to privacy from large databases, private networks, and the internet. It also covers security threats from computer criminals like hackers and issues around computer crime. Finally, it discusses ethics around copyright, software piracy, and plagiarism as shaped by digital technologies.
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxNune SrinivasRao
Cryptography and network security are important topics. Cryptography involves encrypting messages to make them unintelligible during transmission and then decrypting them upon arrival. The objectives of information security are confidentiality, integrity, availability, and nonrepudiation. As technology has advanced, the need for computer and network security has increased. Modern attacks can be automated to target many systems quickly. Collecting and sharing personal data also raises privacy concerns. To address these issues, organizations use various security approaches like trusted systems and security models.
Cat21:Development Mangement Information SystemsSimeon Ogao
Computer systems face security risks like trespassing, theft, alteration of information, and cyber crimes. To address these concerns, organizations must implement security measures to protect their data and systems. These include physical security of computer hardware, restricting access to data and software, using passwords and access codes, conducting security audits, and keeping backup files in secure locations away from the main system. Proper security controls and regular reviews are needed to safeguard computer systems and information from damage or unauthorized access.
The document discusses the evolution of computer security from the 1960s to present day. It covers key events like the creation of ARPANET and the internet, as well as security concerns that emerged with databases, networks, malware, and e-commerce. Examples of early computer attacks are provided, like the Morris worm. The goals, aspects, and components of computer security are defined, including vulnerabilities, threats, countermeasures, and security controls. Physical security principles are also outlined.
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
Running head: CYBERSECURITY IN FINANCIAL DOMAIN 1
CYBERSECURITY IN FINANCIAL DOMAIN 6
Cyber Security in Financial Domain
Introduction
The latest IT sector is faced with several risks. The revolution has a chance with the manufactures of digital supply networks and smart technologies. The revolution is growing at a fast rate which leads to the increase of cyber-attacks. The interconnection of the digital systems leads to the significant rise of cyber-attacks. Some of the firms faced with cyber-attacks are not ready to face the issue of cyber-crime. IT firms need to be organized, vigilant, and resilient to deal with any risk that may arise (Evans, 2019). They need to put strict measures that will help them tackle any issue on its initial before it destroys different organizations.
Background of the problem
Cybersecurity is also referred to as information technology. Cybersecurity is the process which involves protecting networks, systems, and programs from digital attacks. Cybersecurity has been designed in a way that people try to gain access to applications without easily. Cybersecurity attacks intend to manipulate data, interrupt the functionality of the cyber, destroy digitally stored data as well as demand for money from data owners.
The attacks tend to gain access within the information technology so as they can easily manipulate the data. Most industries today have been affected by cybersecurity attacks. Their information has been managed, leading to loss of money. According to Singer and Friedman (2014), coming up with useful cybersecurity measure is a challenge since it requires a lot of time and attention to implement them. Cybersecurity criminals have also evolved and devised modern means and innovations on how they attack industries.
Cybersecurity can be termed as coming up with different practices into the existing systems to ensure credibility, availability, and integrity of information. The challenges faced with IT organizations can be solved with better practices and measures put in place. Organizations use advanced technology to detect any form of attack. The systems are well protected in a way that they cannot be manipulated. The firms will be on the safe side as they will not lose any data to hackers. They will also transform their technology to a new level.
The threats have been said to come in different forms such as ransom ware, malware attacks, and phishing and exploit kits. They have become more complicated due to the growing technologies in organizations. The IT firms have revolutionized over the years up to date. They use the latest technology, such as the use of robots, to make the work easier. Once these threats attack the machines, the machine fails hence will not be valid.
The organizations, therefore, need to come up with the latest techniques that will help them protect their technology. The m ...
In this presentation, we talk about the need for cyber security in organizations to protect important data and prevent attacks on the systems installed in an organization.
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
The document discusses several topics related to computer use and security, including privacy issues, computer crimes, security measures, ergonomics, and health concerns. Specifically, it defines privacy and discusses issues around large databases and private networks. It also defines computer security and different types of computer crimes. The document outlines some security measures like passwords, antivirus software, firewalls, and backups. It defines ergonomics and its importance in reducing fatigue. Finally, it discusses the importance of considering mental and physical health for computer users.
1. The document discusses cyber security issues related to business networks, the internet, and future trends. It covers topics like viruses, hackers, identity theft, spyware, firewalls, passwords, and disaster recovery.
2. Mechanisms for protecting against cyber threats are examined, including keeping software updated, using antivirus software, installing spyware protection, implementing firewalls, and creating strong passwords.
3. Looking ahead, the future of cyber security will be shaped by emerging technologies, more internet-connected devices, increased amounts of personal data online, and growth in cloud computing services. Security challenges will rise as younger users and billions more devices come online.
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
Understand Ethics and Security in the Programming ProcessCasey Robertson
This document discusses ethics and security considerations in computer programming and use. It covers topics like computer ethics, privacy issues related to data collection, laws around technology and privacy in the US, implications of computer use like ergonomics and environmental concerns, protecting software and data through copyright and preventing piracy and viruses, and illegal acts like hacking, cracking, and phishing. Organizations focused on computer ethics and society are also mentioned.
The document outlines an information security workshop presentation on the scope and importance of information security. It discusses 10 key domains of information security knowledge including access control, application security, risk management, cryptography, operations security, physical security, security architecture, telecommunications, and networks. The presenter has 10 years of IT consulting experience and various security certifications. The goals are to raise awareness of information security and the need for regional cooperation such as a Pacific Computer Emergency Response Team.
This chapter discusses ethics, privacy, information security threats, and methods for protecting information resources. It describes major ethical issues related to information technology like privacy, accuracy, property, and accessibility. It outlines threats to information security such as hacking, viruses, spyware, and social engineering. It also explains methods for protecting information systems, including risk management, access controls, network security tools like firewalls and encryption, backup and disaster recovery plans, and information systems auditing.
The document discusses computer security and threats. It defines computer security as protecting computer systems and information from unwanted access, damage, or modification. It describes three types of computer security: hardware security, software/data security, and network security. It also discusses various threats like viruses, Trojans, hackers, and natural disasters. It provides checklists and security measures like backups, antivirus software, firewalls, and access controls to protect against these threats.
ICT refers to the technologies required for information processing, including electronic computers, communication devices, and software applications. These technologies allow for information to be converted, stored, processed, transmitted, and retrieved from anywhere at any time. Key aspects of ICT include computers, the internet, email, video conferencing, phones, fax machines, radio, television, and satellites. ICT has evolved over time from early counting tools to modern computers and is now widely used in education, banking, industry, e-commerce, and other areas of daily life.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
3. Computer Security
Computer security is about
provisions and policies adopted to
protect information and property
from theft, corruption, or natural
disaster while allowing the
information and property to remain
accessible and productive to its
intended users.
4. Computer Security
Network security on the other hand deals with
provisions and policies adopted to prevent and
monitor unauthorized access, misuse, modification, or
denial of the computer network and network-
accessible resources.
Internet
Not Sufficient!!
6. 1) Spoofing Attack
2) Brut Force Attack
3) Malware Attack
4) Virus/Worm Attack
5) SMURF Attack
6) SYN Attack
7) Trojan Horse
8) Logic Bomb
9) Ping of Death
10)Packet Sniffing
11)Eavesdropping
12)Cracking
13)Session Hijacking
14)War Dialing
15)DoS/DDoS
16)Blackout/ Brownout
17)Serge/Spike
18)Traffic Analysis
19)Wire Tapping
Assignment 1 (15%):
• Pick two topics.
• Read about these security
attack related keywords and
write a three page/topic
(maximum) summary of your
findings including any
recorded history of
significant damages created
by these attacks.
• Send your report by email in
pdf format (Use your name as
the file name Ex. Kedir Ali).
• Bonus: While reading, if you
find keywords other than
these, send them on the
second page of your report.
Computer Security
7. Computer Security/ Overview
Security: The prevention and protection of computer
assets from unauthorized access, use, alteration,
degradation, destruction, and other threats.
Privacy: The right of the individual to be protected
against intrusion into his personal life or affairs, or those
of his family, by direct physical means or by publication
of information.
Security/Privacy Threat: Any person, act, or object
that poses a danger to computer security/privacy.
Definitions
8. Computer Security / History
Until 1960s computer security was limited to
physical protection of computers
In the 60s and 70s
Evolutions
Computers became interactive
Multiuser/Multiprogramming was invented
More and more data started to be stored in computer
databases
Organizations and individuals started to worry about
What the other persons using computers are doing to their
data
What is happening to their private data stored in large
databases
9. Computer Security / History
In the 80s and 90s
Evolutions
Personal computers were popularized
LANs and Internet invaded the world
Applications such as E-commerce, E-government and
E-health started to develop
Viruses become majors threats
Organizations and individuals started to worry about
Who has access to their computers and data
Whether they can trust a mail, a website, etc.
Whether their privacy is protected in the connected world
10. Computer Security / History
Famous security problems
Morris worm – Internet Worm
November 2, 1988 a worm attacked more than 60,000 computers
around the USA
The worm attacks computers, and when it has installed itself, it
multiplies itself, freezing the computer
It exploited UNIX security holes in Sendmail and Finger
A nationwide effort enabled to solve the problem within 12 hours
Robert Morris became the first person to be indicted
under the Computer Fraud and Abuse Act.
He was sentenced to three years of probation, 400 hours of
community service and a fine of $10,050
He is currently an associate professor at the
Massachusetts Institute of Technology (MIT)
11. Computer Security / History
Famous security problems …
NASA shutdown
In 1990, an Australian computer science student was
charged for shutting down NASA’s computer system
for 24 hours
Airline computers
In 1998, a major travel agency discovered that
someone penetrated its ticketing system and has
printed airline tickets illegally
Bank theft
In 1984, a bank manager was able to steal $25 million
through un-audited computer transactions
12. Computer Security / History
Famous security problems …
In Ethiopia
Employees of a company managed to change their salaries by
fraudulently modifying the company’s database
In 1990s Internet password theft
Hundreds of dial-up passwords were stolen and sold to other users
Many of the owners lost tens of thousands of Birr each
A major company suspended the use of a remote login software by
technicians who were looking at the computer of the General
Manager
In Africa: Cote d’Ivoire
An employee who has been fired by his company deleted all the
data in his company’s computer
13. Computer Security / History
Early Efforts
1960s: Marked as the beginning of true
computer security
1970s: Tiger teams
Government and industry sponsored crackers who attempted
to break down defenses of computer systems in order to
uncover vulnerabilities so that patches can be developed
1970s: Research and modeling
Identifying security requirements
Formulating security policy models
Defining recommended guidelines and controls
Development of secure systems
14. Computer Security / Legal Issues
In the US, legislation was enacted with regards to
computer security and privacy starting from late
1960s.
European Council adopted a convention on Cyber-
crime in 2001.
The World Summit for Information Society
considered computer security and privacy as a
subject of discussion in 2003 and 2005.
The Ethiopian Penal Code of 2005 has articles on
data and computer related crimes.
15. Computer Security /Attacks
Interruption: An attack on availability
Interception: An attack on confidentiality
Modification: An attack on integrity
Fabrication: An attack on authenticity
Categories of Attacks
16. Computer Security /Attacks
Categories of Attacks/Threats (W. Stallings)
Normal flow of information
Interruption Interception
Modification Fabrication
Source
Destination
Attack
17. Computer Security /Vulnerabilities
Physical vulnerabilities (Ex. Buildings)
Natural vulnerabilities (Ex. Earthquake)
Hardware and Software vulnerabilities (Ex. Failures)
Media vulnerabilities (Ex. Disks can be stolen)
Communication vulnerabilities (Ex. Wires can be tapped)
Human vulnerabilities (Ex. Insiders)
Types of Vulnerabilities
19. Computer Security / The Human Factor
The human factor is an important component of
computer security
Some organizations view technical solutions as
“their solutions” for computer security. However:
Technology is fallible (imperfect)
Ex. UNIX holes that opened the door for Morris worm
The technology may not be appropriate
Ex. It is difficult to define all the security requirements and find a
solution that satisfies those requirements
Technical solutions are usually (very) expensive
Ex. Antivirus purchased by ETC to protect its Internet services
Given all these, someone, a human, has to implement the solution
20. Computer Security / The Human Factor
Competence of the security staff
Ex. Crackers may know more than the security team
Understanding and support of management
Ex. Management does not want to spend money on
security
Staff’s discipline to follow procedures
Ex. Staff members choose simple passwords
Staff members may not be trustworthy
Ex. Bank theft
21. Computer Security / Physical Security
Physical security protects your physical computer
facility (your building, your computer room, your
computer, your disks and other media) [Chuck
Easttom].
Physical security is the use of physical controls to
protect premises, site, facility, building or other
physical asset of an organization [Lawrence Fennelly]
22. Computer Security / Physical Security
In the early days of computing physical security
was simple because computers were big,
standalone, expensive machines
It is almost impossible to move them (not
portable)
They were very few and it is affordable to
spend on physical security for them
Management was willing to spend money
Everybody understands and accepts that there
is restriction
23. Computer Security / Physical Security
Today
Computers are more and more portable (PC, laptop,
PDA, Smartphone)
There are too many of them to have good physical
security for each of them
They are not “too expensive” to justify spending more
money on physical security until a major crisis occurs
Users don’t accept restrictions easily
Accessories (ex. Network components) are not
considered as important for security until there is a
problem
Access to a single computer may endanger many more
computers connected through a network
24. Computer Security / Physical Security
=>
Physical security is much more
difficult to achieve today than some
decades ago
Why?
25. Computer Security / Physical Security
Natural Disasters
Fire and smoke
Fire can occur anywhere
Solution – Minimize risk
Good policies: NO SMOKING, etc..
Fire extinguisher, good procedure and training
Fireproof cases (and other techniques) for backup tapes
Fireproof doors
Climate
Heat
Direct sun
Humidity
Threats and vulnerabilities
26. Computer Security / Physical Security
Natural Disasters …
Hurricane, storm, cyclone
Earthquakes
Water
Flooding can occur even when a water tab is not properly closed
Electric supply
Voltage fluctuation
Solution: Voltage regulator
Lightning
Threats and vulnerabilities …
Solution
Avoid having servers in areas often hit by Natural Disasters!
27. Computer Security / Physical Security
People
Intruders
Thieves
People who have been given access unintentionally by the
insiders
Employees, contractors, etc. who have access to the facilities
External thieves
Portable computing devices can be stolen outside the
organization’s premises
Loss of a computing device
Mainly laptop
Threats and vulnerabilities …
28. Computer Security / Physical Security
Safe area
Safe area often is a locked place where
only authorized personnel can have
access
Organizations usually have safe area for
keeping computers and related devices
29. Computer Security / Physical Security
Is the area inaccessible through other openings
(window, roof-ceilings, ventilation hole, etc.)?
Design of the building with security in mind
Know the architecture of your building
Safe area … Challenges
During opening hours, is it always possible to
detect when unauthorized person tries to get to the
safe area?
Surveillance/guards, video-surveillance, automatic-
doors with security code locks, alarms, etc.
Put signs so that everybody sees the safe area
30. Computer Security / Physical Security
Are the locks reliable?
The effectiveness of locks depends on the design, manufacture,
installation and maintenance of the keys!
Among the attacks on locks are:
Illicit keys
Duplicate keys
Avoid access to the key by unauthorized persons even for a few seconds
Change locks/keys frequently
Key management procedure
Lost keys
Notify responsible person when a key is lost
There should be no label on keys
Circumventing of the internal barriers of the lock
Directly operating the bolt completely bypassing the locking mechanism which remains locked
Forceful attacks:
Punching, Drilling, Hammering, etc.
Safe area…Locks
31. Computer Security / Physical Security
Surveillance with guards
The most common in Ethiopia
Not always the most reliable since it adds a
lot of human factor
Not always practical for users (employees
don’t like to be questioned by guards
wherever they go)
Safe area… Surveillance
32. Computer Security / Physical Security
Safe area… Surveillance
Surveillance with video
Uses Closed Circuit Television (CCTV)
Started in the 1960s
Become more and more popular with the worldwide increase of
theft and terrorism
Advantages
A single person can monitor more than one location
The intruder doesn’t see the security personnel
It is cheaper after the initial investment
It can be recorded and be used for investigation
Since it can be recorded the security personnel is more careful
Today’s digital video-surveillance can use advanced techniques such
as face recognition to detect terrorists, wanted people, etc.
Drawback
Privacy concerns
33. Computer Security / Physical Security
Choose employees carefully
Personal integrity should be as important a
factor in the hiring process as technical skills
Create an atmosphere in which the levels of
employee loyalty, morale, and job satisfaction
are high
Remind employees, on a regular basis, of
their continuous responsibilities to protect
the organization’s information
Internal Human factor - Personnel
34. Computer Security / Physical Security
Establish procedures for proper destruction and
disposal of obsolete programs, reports, and data
Act defensively when an employee must be
discharged, either for cause or as part of a cost
reduction program
Such an employee should not be allowed access to
the system and should be carefully watched until
he or she leaves the premises
Any passwords used by the former employee
should be immediately disabled
Internal Human factor – Personnel …
36. Computer Security / Attacks & Threats
A computer security threat is any person,
act, or object that poses a danger to
computer security
Computer world is full of threats!
… refer to the first assignment…
And so is the real world!
Thieves, pick-pockets, burglars,
murderers, drunk drivers, …
37. Computer Security / Attacks & Threats
What is the right attitude?
To do what you do in real life
What do you do in real life?
You learn about the threats
What are the threats
How can these threats affect you
What is the risk for you to be attacked by these threats
How you can protect yourself from these risks
How much does the protection cost
What you can do to limit the damage in case you are attacked
How you can recover in case you are attacked
Then, you protect yourself in order to limit the risk but to
continue to live your life
You need to do exactly the same thing with computers!
38. Computer Security / Attacks & Threats
Types of Threats/Attacks … (Chuck Eastom)
Hacking Attack:
Any attempt to gain unauthorized access to
your system
Denial of Service (DoS) Attack
Blocking access from legitimate users
Physical Attack:
Stealing, breaking or damaging of computing
devices
39. Computer Security / Attacks & Threats
Malware Attack:
A generic term for software that has malicious
purpose
Examples
Viruses
Trojan horses
Spy-wares
New ones: Spam/scam, identity theft, e-payment
frauds, etc.
Types of Threats/Attacks (Chuck Eastom)
40. Computer Security /Threats
Viruses
“A small program that replicates and hides itself inside
other programs usually without your knowledge.”
Symantec
Similar to biological virus: Replicates and Spreads
Malware Attack:
Worms
An independent program that reproduces by copying
itself from one computer to another
It can do as much harm as a virus
It often creates denial of service
41. Computer Security /Threats
Trojan horses
(Ancient Greek tale of the city of Troy and the wooden
horse) - ??
Secretly downloading a virus or some other type of mal-
ware on to your computers.
Spy-wares
“A software that literally spies on what you do on your
computer.”
Example: Simple Cookies and Key Loggers
Malware Attack…
42. Computer Security /Threats
Infection mechanisms
First, the virus should search for and detect
objects to infect
Installation into the infectable object
Writing on the boot sector
Add some code to executable programs
Add some code to initialization/auto-executable
programs
Write a macro in a word file
…
Most software based attacks are commonly
called Viruses: How do viruses work?
43. Computer Security /Threats
Trigger mechanism
Date
Number of infections
First use
How do viruses work? …
Effects: It can be anything
A message
Deleting files
Formatting disk
Overloading processor/memory
Etc.
44. Computer Security /Threats
Adolescents
Ethically normal and of average/above
average intelligence.
Tended to understand the difference
between what is right and wrong
Typically do not accept any responsibility
for problems caused
Who Writes Virus
45. Computer Security /Threats
The College Student
Ethically normal
Despite expressing that what is illegal is
“wrong”
Are not typically concerned about the results of
their actions related to their virus writing
Who Writes Virus …
The Adult (smallest category)
Ethically abnormal
46. Computer Security /Threats
Three categories
Scanners
Activity monitors
Change detection software
Anti-Virus
There are
Generic solutions
Ex. Integrity checking
Virus specific solution
Ex. Looking for known viruses
47. Computer Security /Threats
Functions of anti-viruses
Identification of known viruses
Detection of suspected viruses
Blocking of possible viruses
Disinfection of infected objects
Deletion and overwriting of infected
objects
Anti-Virus …
48. Computer Security /Threats
Hacking: is any attempt to intrude or gain
unauthorized access to your system either via
some operating system flaw or other means. The
purpose may or may not be for malicious
purposes.
Hackers/Intrusion Attack:
Cracking: is hacking conducted for malicious purposes.
49. Computer Security /Threats
DoS Attack: is blocking access of legitimate
users to a service.
Denial of Service (DoS) Attack:
Distributed DoS Attack: is accomplished by
tricking routers into attacking a target or using
Zumbie hosts to simultaneously attack a given
target with large number of packets.
50. Computer Security /Threats
Simple illustration of DoS attack (from Easttom)
C:>Ping <address of X> -l 65000 –w 0 -t
Ping
Ping
Ping
Ping
Web Server X
Legitimate User
51. Encryption
Encryption: The conversion of data into
ciphertext, that cannot be easily understood by
unauthorized people.
Decryption: The process of converting
encrypted data back into its original form so
that it can be understood.
Text: Human, readable sequences of characters
Plaintext: What you have before encryption
Ciphertext: Encrypted text
Cipher: Usually refers to the method of encryption