F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
The document introduces system security, defining it as protecting information system resources to preserve integrity, availability, and confidentiality. It discusses the CIA security triad of confidentiality, integrity, and availability, along with additional aspects of authenticity and accountability for complete security. The document defines key security terminology from RFC 2828 and covers security threats like interception, interruption, and modification. It also examines hardware, software, and data vulnerabilities that can threaten system security.
How To Learn The Network Security
Slide berikut merupakan slide yang berisikan dasar-dasar bagi kita dalam memahami konsep keamanan jaringan komputer, baik dari sisi inftrastruktur, teknologi dan paradigma bagi pengguna.
Materi yang diberikan sudah disusun oleh Pakar yang merupakan Trainer CEH dan memang berkompeten dibidang keamanan jaringan.
Slide ini saya dapatkan dari beliau saat mengikut training Certified Computer Security Officer (CCSO) dan Certified Computer Security Analyst (CCSA) dari beliau.
Semoga bermanfaat sebagai acuan bagi kita untuk belajar tentang keamanan jaringan komputer.
Terimakasih
This document provides an overview of key concepts in computer and information security. It discusses cyber security, data security, network security, and authentication, authorization and accounting (AAA). It also covers the NIST FIPS 199 standard for categorizing information systems based on potential impact, and different methodologies for modeling assets and threats such as STRIDE, PASTA, Trike and VAST. The key topics are introduced at a high level with definitions and examples to provide the essential information about common computer security concepts and frameworks.
USER AUTHENTICATION
MEANS OF USER AUTHENTICATION
PASSWORD AUTHENTICATION
PASSWORD VULNERABILITIES
USE OF HASHED PASSWORDS – IN UNIX
PASSWORD CRACKING TECHNIQUES
USING BETTER PASSWORDS
TOKEN AUTHENTICATION
BIO-METRIC AUTHENTICATION
While computer systems today have some of the best security systems ever, they are more vulnerable than ever before.
This vulnerability stems from the world-wide access to computer systems via the Internet.
Computer and network security comes in many forms, including encryption algorithms, access to facilities, digital signatures, and using fingerprints and face scans as passwords.
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
Network security involves protecting network usability and integrity through hardware and software technologies. It addresses vulnerabilities that threats may exploit to launch attacks. Common vulnerabilities include issues with technologies, configurations, and security policies. Threats aim to take advantage of vulnerabilities and can be structured, unstructured, internal, or external. Common attacks include reconnaissance to gather information, unauthorized access attempts, denial-of-service to disrupt availability, and use of malicious code like worms, viruses, and Trojan horses.
This document discusses network security and various cyber attacks. It defines network security and lists common security devices. It outlines different types of hackers and cyber attacks such as hacking, DDoS attacks, malware, Trojan horses, spam, phishing, and packet sniffers. The document also discusses worms, viruses, botnets, and how to protect critical information infrastructure. It provides examples of security software and firewall types. Finally, it discusses challenges in network security and provides references for further information.
The document discusses system security and defines key related terms. System security is the ability of a system to protect itself from accidental or deliberate attacks. It is essential for availability, reliability, and safety as most systems are networked. Without proper security, systems are vulnerable to damage like denial of service, data corruption, and disclosure of confidential information. Security can be achieved through strategies such as avoiding vulnerabilities, detecting and eliminating attacks, and limiting exposure and enabling recovery from successful attacks.
Basic Network Attacks
The active and passive attacks can be differentiated on the basis of what are they, how they are performed and how much extent of damage they cause to the system resources. But, majorly the active attack modifies the information and causes a lot of damage to the system resources and can affect its operation. Conversely, the passive attack does not make any changes to the system resources and therefore doesn’t causes any damage.
The Presentation is about the Basic Introduction to Cybersecurity that talks about introduction and what is security means. Also the presentation talks about CIA Triad i.e confidentiality, integrity and availability
The document discusses malware analysis using machine learning. It proposes collecting malware binaries from online sources and using Cuckoo Sandbox to analyze their behavior dynamically. Features would be extracted from the analysis reports and used to classify the malware into families using machine learning algorithms. The goal is to develop an automated malware classification system that can identify both known and unknown malware types.
The document discusses design principles for secure programming and common security problems. It outlines principles like least privilege and fail-safe defaults. It then describes common problems such as improper initial privileges, lack of isolation, improper changes, validation issues, and sequencing errors. It provides implementation rules to avoid these problems, like checking privileges, validating all inputs, and ensuring atomic operations.
This document discusses reconnaissance techniques for penetration testing and bug bounty hunting. It defines reconnaissance as gathering information without actively engaging networks to identify assets like IP addresses, open ports, operating systems and vulnerable components. Both active reconnaissance, which involves direct interaction, and passive reconnaissance, which does not, are covered. Specific techniques include using tools like Whois and IP mapping to find subdomains and server information. The document also discusses using GitHub to find sensitive information accidentally exposed, as well as tools like Wayback Machine, ParamSpider and Arjun for automated reconnaissance.
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "Cybersecurity Fundamentals" will introduce you to the world of cybersecurity and talks about its basic concepts. Below is the list of topics covered in this session:
Need for cybersecurity
What is cybersecurity
Fundamentals of cybersecurity
Cyberattack Incident
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
The document provides an introduction to intrusion detection systems (IDS). It defines key concepts related to information security like threats, attacks, and security goals of confidentiality, integrity and availability. It discusses different types of attacks such as passive eavesdropping and active attacks like interruption, modification and fabrication. The document then introduces IDS, explaining what it is, the need for it, types of intrusions from inside and outside, and classifications of IDS based on information source, type of information and usage frequency.
Network security is important to protect vital information while allowing authorized access. Key aspects of network security include identifying vulnerabilities, threats like hackers and methods of attack, and implementing appropriate countermeasures. Common attacks include password attacks, viruses, and packet sniffing. Effective countermeasures include firewalls to control access, intrusion detection systems to monitor for exploits, IPsec and encryption to secure communications, and user education to address social engineering vulnerabilities. Comprehensive security requires backups, encryption, virus protection, firewalls, monitoring, training, and testing defenses.
Vulnerabilities in modern web applicationsNiyas Nazar
Microsoft powerpoint presentation for BTech academic seminar.This seminar discuses about penetration testing, penetration testing tools, web application vulnerabilities, impact of vulnerabilities and security recommendations.
Network security involves protecting computer networks from unauthorized access. It aims to achieve access control, confidentiality, authentication, integrity, and non-repudiation. Throughout history, as hacking and crimes emerged in the 1980s and the Internet became public in the 1990s, security concerns increased tremendously. Network security employs multiple layers including physical security, perimeter protection, user training, encryption, and firewalls among other hardware and software components. As threats continue to evolve, the field of network security must also evolve rapidly to protect information and system resources.
The document discusses the CIA triad, which is a model for information security with three main goals: confidentiality, integrity, and availability. Confidentiality ensures that sensitive information is only accessible to authorized individuals. Integrity ensures that information remains true and correct. Availability ensures that information and resources are accessible to those who need them. The CIA triad serves as a guide for measures to secure information systems and networks.
This document discusses cyber security and the various threats to online data and systems. It defines cyber as relating to information technology and the internet. Cyber security helps secure data from theft or misuse and protects systems from viruses, hackers, malware, Trojan horses, and password cracking. Common cyber threats include viruses that infect files and boot sectors, as well as overwrite data. Solutions involve installing antivirus software. Hackers can be white, grey, or black hat with white hats helping security and black hats stealing data illegally. Malware is malicious software that damages systems covertly. Strong passwords and firewalls help prevent hacking and downloading malware and Trojans.
this ppt is on the topic of system security. there are some topic which are introduce very nicely.there are some commont topic introduce in the
1. firewall
2.antivirus
3.malware
and IOT
these are the sub topic..
The document discusses various techniques for cracking passwords, including dictionary attacks, brute force attacks, and exploiting weaknesses in password hashing algorithms. Default passwords, social engineering through phishing emails, and the use of tools like Cain and Abel, John the Ripper, and THC Hydra are also covered as effective cracking methods. Common password mistakes that can enable cracking are also listed.
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
This document discusses several types of computer security risks and methods to reduce risks. It describes common computer crimes like software piracy, hacking, and computer sabotage using malware. It also discusses how these risks affect personal privacy and intellectual property. Finally, it provides recommendations for protecting systems through physical access restrictions, passwords, firewalls, encryption, backups, and RAID technology to safeguard data integrity and availability.
Basic Network Attacks
The active and passive attacks can be differentiated on the basis of what are they, how they are performed and how much extent of damage they cause to the system resources. But, majorly the active attack modifies the information and causes a lot of damage to the system resources and can affect its operation. Conversely, the passive attack does not make any changes to the system resources and therefore doesn’t causes any damage.
The Presentation is about the Basic Introduction to Cybersecurity that talks about introduction and what is security means. Also the presentation talks about CIA Triad i.e confidentiality, integrity and availability
The document discusses malware analysis using machine learning. It proposes collecting malware binaries from online sources and using Cuckoo Sandbox to analyze their behavior dynamically. Features would be extracted from the analysis reports and used to classify the malware into families using machine learning algorithms. The goal is to develop an automated malware classification system that can identify both known and unknown malware types.
The document discusses design principles for secure programming and common security problems. It outlines principles like least privilege and fail-safe defaults. It then describes common problems such as improper initial privileges, lack of isolation, improper changes, validation issues, and sequencing errors. It provides implementation rules to avoid these problems, like checking privileges, validating all inputs, and ensuring atomic operations.
This document discusses reconnaissance techniques for penetration testing and bug bounty hunting. It defines reconnaissance as gathering information without actively engaging networks to identify assets like IP addresses, open ports, operating systems and vulnerable components. Both active reconnaissance, which involves direct interaction, and passive reconnaissance, which does not, are covered. Specific techniques include using tools like Whois and IP mapping to find subdomains and server information. The document also discusses using GitHub to find sensitive information accidentally exposed, as well as tools like Wayback Machine, ParamSpider and Arjun for automated reconnaissance.
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka PPT on "Cybersecurity Fundamentals" will introduce you to the world of cybersecurity and talks about its basic concepts. Below is the list of topics covered in this session:
Need for cybersecurity
What is cybersecurity
Fundamentals of cybersecurity
Cyberattack Incident
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
The document provides an introduction to intrusion detection systems (IDS). It defines key concepts related to information security like threats, attacks, and security goals of confidentiality, integrity and availability. It discusses different types of attacks such as passive eavesdropping and active attacks like interruption, modification and fabrication. The document then introduces IDS, explaining what it is, the need for it, types of intrusions from inside and outside, and classifications of IDS based on information source, type of information and usage frequency.
Network security is important to protect vital information while allowing authorized access. Key aspects of network security include identifying vulnerabilities, threats like hackers and methods of attack, and implementing appropriate countermeasures. Common attacks include password attacks, viruses, and packet sniffing. Effective countermeasures include firewalls to control access, intrusion detection systems to monitor for exploits, IPsec and encryption to secure communications, and user education to address social engineering vulnerabilities. Comprehensive security requires backups, encryption, virus protection, firewalls, monitoring, training, and testing defenses.
Vulnerabilities in modern web applicationsNiyas Nazar
Microsoft powerpoint presentation for BTech academic seminar.This seminar discuses about penetration testing, penetration testing tools, web application vulnerabilities, impact of vulnerabilities and security recommendations.
Network security involves protecting computer networks from unauthorized access. It aims to achieve access control, confidentiality, authentication, integrity, and non-repudiation. Throughout history, as hacking and crimes emerged in the 1980s and the Internet became public in the 1990s, security concerns increased tremendously. Network security employs multiple layers including physical security, perimeter protection, user training, encryption, and firewalls among other hardware and software components. As threats continue to evolve, the field of network security must also evolve rapidly to protect information and system resources.
The document discusses the CIA triad, which is a model for information security with three main goals: confidentiality, integrity, and availability. Confidentiality ensures that sensitive information is only accessible to authorized individuals. Integrity ensures that information remains true and correct. Availability ensures that information and resources are accessible to those who need them. The CIA triad serves as a guide for measures to secure information systems and networks.
This document discusses cyber security and the various threats to online data and systems. It defines cyber as relating to information technology and the internet. Cyber security helps secure data from theft or misuse and protects systems from viruses, hackers, malware, Trojan horses, and password cracking. Common cyber threats include viruses that infect files and boot sectors, as well as overwrite data. Solutions involve installing antivirus software. Hackers can be white, grey, or black hat with white hats helping security and black hats stealing data illegally. Malware is malicious software that damages systems covertly. Strong passwords and firewalls help prevent hacking and downloading malware and Trojans.
this ppt is on the topic of system security. there are some topic which are introduce very nicely.there are some commont topic introduce in the
1. firewall
2.antivirus
3.malware
and IOT
these are the sub topic..
The document discusses various techniques for cracking passwords, including dictionary attacks, brute force attacks, and exploiting weaknesses in password hashing algorithms. Default passwords, social engineering through phishing emails, and the use of tools like Cain and Abel, John the Ripper, and THC Hydra are also covered as effective cracking methods. Common password mistakes that can enable cracking are also listed.
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
This document discusses several types of computer security risks and methods to reduce risks. It describes common computer crimes like software piracy, hacking, and computer sabotage using malware. It also discusses how these risks affect personal privacy and intellectual property. Finally, it provides recommendations for protecting systems through physical access restrictions, passwords, firewalls, encryption, backups, and RAID technology to safeguard data integrity and availability.
This document discusses biometric authentication for ATM security. It describes common ATM attacks like skimming and explains how biometric authentication works by using unique human characteristics. Various biometric modalities are described, including fingerprints, iris scans, palm veins, and facial recognition. Multimodal biometrics is presented as an accurate approach that fuses multiple biometrics to strongly authenticate users. Applications of biometrics for ATMs and other systems are mentioned along with advantages like improved security and disadvantages like increased costs. The conclusion states that multimodal biometrics provides a high level of ATM security by reducing fraudulent activities and false acceptance rates.
This document discusses basic concepts in computer security. It defines computer security as techniques for ensuring data cannot be read or compromised without authorization, usually through encryption and passwords. The three main goals of computer security are confidentiality, integrity, and availability. Vulnerabilities are weaknesses that can be exploited, and threats are circumstances with potential to cause harm. Common threats include interception, interruption, modification, and fabrication. Controls are protective measures used to reduce vulnerabilities, and physical security and security methods like antivirus software and firewalls can help secure computers.
The document provides an overview of search engines, including their basics, functioning, types, advantages, disadvantages, and limitations. It defines a search engine as a tool that indexes websites and builds databases to help retrieve information from the internet based on keyword queries. The document discusses different types of search engines such as general, meta, subject-specific, intelligent/specialized, deep/invisible web, and scholarly literature search engines. It also compares search engines to directories and portals.
This document provides an introduction and overview of databases and the basic operations used to manage data in a database using Microsoft Access 2007. It defines what a database is, how data is organized in tables with rows and columns, and when it is appropriate to use a database. It also outlines and provides examples of the basic CRUD (create, read, update, delete) operations used in structured query language (SQL) to manipulate data, including inserting, selecting, updating, and deleting records from database tables.
A database is a collection of data that can be used alone or combined to answer users' questions. A database management system (DBMS) provides programs to manage databases, control data access, and include a query language. When designing a database, it is important to structure the data so that specific records can be easily accessed, the database can respond to different questions, minimal storage is used, and redundant data is avoided. Key concepts in database design include entities, attributes, records, primary keys, foreign keys, and relationships between tables.
This document summarizes the key topics covered in a class on network security. It introduces common security concepts like authentication, access control, data confidentiality and integrity. It also discusses common security threats like passive attacks, active attacks, and security services defined by the ITU-T standard X.800. The document provides examples of security mechanisms and an outline of the topics to be covered, including a whirlwind tour of computer networks and an anatomy of an attack in five phases.
The document discusses the Data Encryption Standard (DES) cipher. It was the most widely used symmetric cipher but has been replaced by the Advanced Encryption Standard (AES). DES encrypts data in 64-bit blocks using a 56-bit key. It operates by applying an initial permutation to the plaintext block, dividing it into halves, and performing 16 rounds of substitution and permutation using 48-bit subkeys generated from the main key. Each round includes expanding, XORing with the subkey, and applying S-boxes and permutations to provide diffusion and confusion.
This document provides information about a network security course, including the instructor's contact details, course schedule, grading policy, reference materials, expectations, and course contents. The course will cover topics such as cryptography, network security applications, system security, and intrusion detection. Students will learn about network security principles, cryptography, authentication and encryption techniques, and security practices and applications.
The document defines security attacks and threats. It describes different types of attacks like passive attacks, active attacks, insider attacks, phishing attacks, spoofing attacks, hijack attacks, exploit attacks and password attacks. It also discusses two common threats - Cross Site Scripting (XSS) and SQL injection. XSS involves injecting malicious code snippets while SQL injection embeds malicious code in a poorly-designed app passed to the backend database.
The document discusses classical encryption techniques, including symmetric encryption which uses the same key for encryption and decryption. It describes ciphers like the Caesar cipher which substitutes letters by shifting the alphabet, the monoalphabetic cipher with one substitution table, and the polyalphabetic Vigenère cipher which uses multiple substitution alphabets. The document also covers the Playfair cipher which encrypts letters in pairs using a 5x5 keyword matrix, and discusses cryptanalysis techniques for breaking classical ciphers.
The document discusses the OSI security architecture and common network security threats and defenses. It begins with an introduction to the OSI security architecture proposed by ITU-T as a standard for defining and providing security across network layers. It then discusses (1) specific security mechanisms like encryption and digital signatures and pervasive mechanisms like security audits; (2) common passive and active security threats like eavesdropping and denial of service attacks; and (3) that passive attacks focus on prevention while active attacks require detection and recovery. It concludes with exercises asking about these topics.
Classical Encryption Techniques in Network Securitybabak danyal
The document provides an overview of classical encryption techniques, including: symmetric ciphers that use the same key for encryption and decryption (such as the Caesar cipher, monoalphabetic ciphers like the Playfair cipher, and polyalphabetic ciphers like the Vigenère cipher) as well as transposition techniques that rearrange plaintext; rotor machines like the Enigma that implemented complex polyalphabetic substitution; and steganography that hides messages within other files or messages. The goal is to introduce basic concepts and terminology of encryption to prepare for studying modern cryptography.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Network Security consists of the provisions and policies adopted by a network
administrator to prevent and monitor unauthorized access, misuse, modification,
or denial of a computer network and network-accessible resources. Network
security involves the authorization of access to data in a network, which is
controlled by the network administrator. Users choose or are assigned an ID and
password or other authenticating information that allows them access to
information and programs within their authority.
The document discusses various types of computer attacks and malware including viruses, worms, Trojans, spyware and adware. It describes how viruses can replicate and infect other systems, and the importance of anti-virus software. Network attacks like denial of service attacks and distributed denial of service attacks are covered. Methods of protecting systems through firewalls, user education, and physical security measures are also summarized.
The document introduces databases and database management systems (DBMS). It discusses that a DBMS is software that allows users to create, access, and manage data and databases. A DBMS is made up of four main components: users, a database, database applications, and the DBMS itself. The DBMS controls access to the database and enforces rules like security and data integrity. It also discusses some advantages of using a DBMS like improved data sharing and consistency.
Here are some ways I would optimize the backup strategy:
- Only back up data directories instead of entire hard disks to reduce backup size and time.
- Stagger backups throughout the night instead of all at once to avoid overloading the network.
- Store backups offsite as well as on the NAS for disaster recovery in case the onsite storage is damaged.
- Consider cloud backup services for additional offsite storage.
- Encrypt backups for security and confidentiality.
- Test restores periodically to validate backups are working properly.
- Consider versioning backups to allow restoration of previous file versions.
- Automate verification of backups to catch any failures or corrupt backups.
- Review
Computer security involves protecting computers and data from damage, theft, or misuse. It focuses on security attacks, mechanisms to prevent attacks, and security services. The main goals of information security are confidentiality, integrity, and availability of data and systems. Common security threats include phishing, botnets, rootkits, keyloggers, hackers, and drive-by downloads. Authentication systems like passwords, biometrics, firewalls, and cryptography help verify users' identities and protect sensitive information.
2.5 safety and security of data in ict systems 13 12-11mrmwood
The document discusses various threats to the safety and security of data in ICT systems, including internal threats like disgruntled employees and external threats such as hackers. It also covers different types of threats like viruses, trojan horses, and logic bombs, and methods that can be used to protect against these threats, such as firewalls, virus protection software, and restricting access privileges. The document stresses the importance of security policies, procedures, monitoring, and training employees to help prevent security breaches.
This document provides information about computer security, including definitions, types of security threats, and security measures. It discusses hardware, software, data, and network security. Security threats include viruses, Trojan horses, worms, hackers, and natural disasters. Security measures to address these threats include data backups, cryptography, antivirus software, anti-spyware software, firewalls, and ensuring proper human security procedures are followed. The relationship between security threats and measures is that threats can come in various forms, while security measures are implemented to prevent unauthorized access or damage from these threats.
The document discusses computer security and threats. It defines computer security as protecting computer systems and information from unwanted access, damage, or modification. It describes three types of computer security: hardware security, software/data security, and network security. It also discusses various threats like viruses, Trojans, hackers, and natural disasters. It provides checklists and security measures like backups, antivirus software, firewalls, and access controls to protect against these threats.
Security measures can be used to prevent unauthorized access to accounts and data. They include data backup, cryptography, antivirus software, anti-spyware, firewalls, and addressing human aspects. Data backup allows recovery from data loss. Cryptography encrypts data. Antivirus and anti-spyware detect and remove viruses and spyware. Firewalls restrict network access. Addressing human aspects includes training, awareness, and individual responsibilities. Proper security measures can help protect computer systems and data from various cyber threats.
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
This document discusses various cybersecurity threats and best practices for protection. It begins by defining key cybersecurity terminology. It then describes the spectrum of cyber threats from personal to global levels, including viruses, worms, Trojans, and types of hacking like phishing, spoofing and hacktivism. Examples of cyberwarfare and its purposes are provided. The document recommends developing literacy about threats, protecting vulnerabilities in devices, software and user behavior, and describes approaches for secure environments like backups and system updates. Cyber threats targeting students are also outlined.
This document discusses information systems security, ethics, and privacy. It identifies several risks to information systems including human factors, environmental hazards, system failures, and cybercrime. It then outlines various security measures that can be implemented to minimize these risks, such as antivirus software, firewalls, access control, encryption, backups, and disaster recovery plans. The document also discusses issues around privacy, data collection, and potential health impacts of excessive technology use such as computer vision syndrome, repetitive strain injuries, and addiction.
The document discusses data security and various threats to data. It provides definitions of key terms like data, security, and data security. It then describes three main objectives of the project: to understand data security threats and their backgrounds, and techniques to defend against these threats. Various threats are outlined, like human threats from hackers, staff, and spies. Technologies for security like cryptography, firewalls, and intrusion detection systems are also summarized. The document provides an overview of the importance of data security.
This document provides an overview of information systems and security topics including computer security, authentication mechanisms, firewalls, computer crimes, social impacts of computers, computer viruses, worms, digital signatures and certificates. It discusses information security principles of confidentiality, integrity and availability. It also covers specific authentication mechanisms like passwords, multi-factor authentication, certificates, tokens and biometrics. Additionally, it defines what a firewall is and how it works to inspect and block unauthorized network traffic based on packet rules.
This document discusses computer security and various cyber threats. It begins by explaining how computer security became increasingly important with the development of modems and personal computers in the late 20th century. It then discusses different methods used to protect computer systems and information, including serial numbers, locks, alarms, and various security strategies to address threats like data theft, vandalism, fraud, and privacy invasion. The document also provides definitions and examples of cryptography, encryption, malware, and other cyber attacks like phishing, watering hole attacks, and cybercrime. It concludes by listing some common reasons for web threats and tips to protect against web service attacks, such as backups, multi-factor authentication, malware scanning, and keeping software updated.
Topic #17 IT Security ITSecurityIncidentsA.docxjuliennehar
Topic #17
IT Security
IT Security Incidents: A Worsening Problem
Security of informa:on technology is cri:cal
§ protect confiden+al business data, including customer and
employee data
§ protect against malicious acts of the5 or disrup6on
Security concerns must be balanced against other business needs
(ethical decision regarding IT security):
§ Pursue prosecu6on at all costs or maintain low profile : to avoid
nega6ve publicity!!
§ how much effort and money should be devoted to security?
§ if firm produces SW with security flaws, what ac6ons should it
take?
§ what if security safeguards make life more difficult for
customers and employees: will it result in lost sales and
increased costs?
2
Number of IT Security Incidents Are Increasing
Computer Emergency Response Team Coordina6on Center
(CERT/CC)
§ Established in 1988 at the So5ware Engineering Ins6tute (SEI)
§ SEI: federally funded R&D center at CMU
§ Charged with
§ coordina6ng communica6on among experts during
computer security emergencies
§ helping to prevent future incidents
§ study Internet security vulnerabili6es
§ publish security alerts
§ develop informa6on and training for organiza6ons
3
Increasing Complexity Increases Vulnerability
Compu6ng environment is enormously complex
Con6nues to increase in complexity:
§ networks, computers, OSes
§ apps, Web sites
§ switches, routers, gateways
§ all interconnected and driven by 100s of millions of LoC
(Lines of Code).
Number of possible entry points to a network expands
con6nuously as more devices added,
§ This increases possibility of security breaches
4
Increased Reliance on Commercial SoDware with
Known Vulnerabili:es
Exploit: An a\ack on an informa6on system that takes advantage of a
par6cular system vulnerability. Typically due to poor system design or
implementa6on SW developers quickly create and issue patch:
§ a “fix” to eliminate the problem
§ users are responsible for obtaining and installing patches
-which they can download from the Web
§ delays in installing patches expose users to security breaches
Zero-day aIack: Takes place before a vulnerability is discovered or fixed
U.S. companies rely on commercial so5ware with known vulnerabili6es.
IT orgs con6nue to use installed So5ware “as is” (e.g. IE, RealPlayer, JRE)
§ Since security fixes could make SW harder to use or eliminate
“nice to have features.”
5
Number of Vulnerabili:es Reported to CERT/CC
6
Rate of
discovering
So5ware
vulnerabili6es
Exceeds 10/day
AIack of the Giant Worm
• On November 2, 1988, a worm began to thread its way
through the Internet. Once installed, it mul6plied, clogging
available space, un6l computers ground to a halt. The worm
exploited UNIX holes in sendmail and fingerd. Around 2500
computers were infected.
Within 12 hours, the Computer Systems Research Group at
Berkeley developed ...
This document provides an overview of basic computer security practices and a top 10 list of good security habits. It explains that computer security protects systems and data from threats. While technology provides some protections, users are responsible for 90% of security through good practices. The top 10 list includes recommendations like backing up data, using strong passwords, keeping systems updated, practicing safe email and internet usage, and physically securing devices and data. The document emphasizes that everyone must understand and follow security practices to protect their devices, information and institutions from risks like data loss, identity theft and costly security incidents.
Internet security involves protecting systems and data from unauthorized access. Common security threats include hacking, viruses, phishing, and denial of service attacks. It is important for users to implement security measures like firewalls and keep software updated to prevent intrusions and thefts of personal information.
Internet security involves protecting systems and data from unauthorized access. Common security threats include hacking, viruses, phishing, and denial of service attacks. It is important for users to implement security measures like firewalls and keep software updated to prevent intrusions and thefts of personal information.
1. The document discusses cyber security issues related to business networks, the internet, and future trends. It covers topics like viruses, hackers, identity theft, spyware, firewalls, passwords, and disaster recovery.
2. Mechanisms for protecting against cyber threats are examined, including keeping software updated, using antivirus software, installing spyware protection, implementing firewalls, and creating strong passwords.
3. Looking ahead, the future of cyber security will be shaped by emerging technologies, more internet-connected devices, increased amounts of personal data online, and growth in cloud computing services. Security challenges will rise as younger users and billions more devices come online.
SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptxanovalexter
SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx SAFETY AND SECURITY.pptx
This document provides an overview of Free Libre Open Source Software (FLOSS) development. It discusses what FLOSS is, why to use and develop FLOSS, and how FLOSS is developed. FLOSS development is described as an open, collaborative process done within communities internationally. Developers work together decentralizedly using tools like mailing lists, version control systems, and bug trackers. New contributors start by engaging with communities, submitting issues and patches. Community leadership focuses on meritocracy, autonomy, and delegating tasks. Challenges to Cuban participation include internet access and license decisions, but these may be addressed through solutions.
F. Questier, Ressources éducatives libres & droits d’auteurs, presented in the e-formation “Réussir l’enseignement à distance : de la scénarisation à l’évaluation” de l’Erasmus Academy, 1st of July 2020
This document summarizes a presentation on plagiarism prevention and detection. It defines plagiarism as using another's work without attribution. While not a legal crime, plagiarism is considered an academic offense. Both prevention through education and detection methods have limitations. Detection tools can be fooled and incorrectly flag original work. The best prevention strategies involve thorough education of students about proper citation and encouraging writing practices that promote original thought. Overall the presentation argues for focusing on prevention over problematic detection approaches.
This presentation discusses strategies and policies for promoting free/libre and open source software (FLOSS) in research and education. It provides a brief history of FLOSS, outlines reasons to use and develop FLOSS, and describes perceived barriers to adoption. It also summarizes a study on FLOSS knowledge, perceptions and adoption in Flemish schools, which developed a conceptual model of acceptance factors. The presentation concludes with recommendations for FLOSS policies and strategies for institutional migrations to FLOSS.
Cite as: F. Questier, Open learning, Experiences from the MarMOOC project, Presented at University of Hasselt, Belgium, August 2018, VLIR-UOS international workshop interoperability between information platforms.
Authentication options for Open edX: focus on OAuth and OpenIDFrederik Questier
F. Questier, Authentication options for Open edX: focus on OAuth and OpenID, presentation for the Erasmus+ MarMOOC project, Universidade de Vigo, Spain, 04/04/2018
F. Questier, MOOCs & Openness. Les aspects ouverts des MOOC: clé pour un processus d'apprentissage réussi. Présenté à Université Ibn Tofaïl, Kénitra, Maroc, Avril 2017; Presented at Universidad de Vigo, May 2017
This document discusses new learning paradigms and technologies that can improve education. It suggests universities should change how they educate students to better prepare them for an unknown future with rapid technological changes. Modern teaching approaches are more student-centered, collaborative, and focus on developing skills for lifelong learning compared to traditional teaching. Educational technologies can augment teaching by supporting complex, contextualized learning activities. The document outlines strategies universities can take to promote educational innovation, such as establishing an innovation center, formalizing collaboration between faculties, and developing an educational vision.
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...Frederik Questier
A. Lemus, F. Questier, F. Ciudad, Free Libre and Open Source Software Acceptance in the Cuban Higher Educational System, Tenth International Congress on Higher Education, Universidad 2016, Cuba.
Students' Experiential Knowledge Production in the Teaching-Learning Process ...Frederik Questier
D. Benítez-Erice, F. Questier, D. Pérez-Luján, Students Experiential Knowledge Production in the Teaching-Learning Process of Universities, Proceedings of 16th European Conference on Knowledge Management, ECKM 2015, pp. 132-14, ISBN 978-1-910810-47-7
Institutional strategies for educational innovation and e-learningFrederik Questier
This presentation discusses strategies for educational innovation and e-learning at Jimma University in Ethiopia. It recommends establishing an educational innovation center to provide resources and training to teaching staff. It also suggests formalizing contact with each faculty through an educational innovation committee and collaborating with educational researchers. Performing needs analyses of teachers and disseminating best practices are also presented as ways to support the adoption of innovative teaching methods using information and communication technologies.
This presentation discusses new learning paradigms and technologies. It begins by noting that the future is unpredictable and students today may not realize how much their professional lives will change. It then discusses trends like the technological singularity, increasing connectivity through devices and the internet of things, and how information abundance has replaced scarcity. The presentation advocates preparing students for this unknown future by focusing on skills like social skills, creativity, and lifelong learning rather than only transmitting knowledge. It also promotes active, collaborative, and constructionist approaches to learning over passive absorption of knowledge.
This document provides an overview of free and open source software (FOSS). It discusses the history of software sharing and development, the rise of proprietary software, and the free software movement started by Richard Stallman. FOSS tools like Linux have seen widespread adoption and now dominate areas like web servers and supercomputing. The document examines motivations for using FOSS such as cost savings, security, and avoiding vendor lock-in. It also discusses the competitive advantages that FOSS provides for both individuals and institutions.
Challenges for 21st century education and blended learningFrederik Questier
F. Questier, Challenges for 21st century education and blended learning; Lecture for Masterclass professionele ontwerpteams, Associatie KU Leuven, 12/02/15 https://associatie.kuleuven.be/events/mcpot/programma
This presentation discusses Free and Open Source Software (FOSS). It begins with a brief history of software development and the early days of sharing source code. It then covers the definitions of free software, open source software, and different software licenses. Examples are given of the success and widespread adoption of Linux and open source browsers and office suites. Strategies for effective use of FOSS in academic environments are discussed, along with open content and OER. Reasons why individuals and institutions should use FOSS include control, security, avoidance of lock-in, cross-platform use, fun and learning, involvement of students, and reduced costs. The presentation concludes by discussing business opportunities involving FOSS.
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxJustin Reock
Building 10x Organizations with Modern Productivity Metrics
10x developers may be a myth, but 10x organizations are very real, as proven by the influential study performed in the 1980s, ‘The Coding War Games.’
Right now, here in early 2025, we seem to be experiencing YAPP (Yet Another Productivity Philosophy), and that philosophy is converging on developer experience. It seems that with every new method we invent for the delivery of products, whether physical or virtual, we reinvent productivity philosophies to go alongside them.
But which of these approaches actually work? DORA? SPACE? DevEx? What should we invest in and create urgency behind today, so that we don’t find ourselves having the same discussion again in a decade?
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where we’ll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, we’ll cover how Rust’s unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPathCommunity
Join this UiPath Community Berlin meetup to explore the Orchestrator API, Swagger interface, and the Test Manager API. Learn how to leverage these tools to streamline automation, enhance testing, and integrate more efficiently with UiPath. Perfect for developers, testers, and automation enthusiasts!
📕 Agenda
Welcome & Introductions
Orchestrator API Overview
Exploring the Swagger Interface
Test Manager API Highlights
Streamlining Automation & Testing with APIs (Demo)
Q&A and Open Discussion
Perfect for developers, testers, and automation enthusiasts!
👉 Join our UiPath Community Berlin chapter: https://community.uipath.com/berlin/
This session streamed live on April 29, 2025, 18:00 CET.
Check out all our upcoming UiPath Community sessions at https://community.uipath.com/events/.
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
1. Computer
security
Prof. dr. Frederik Questier - Vrije Universiteit Brussel
Workshop for Lib@web 2015 - International Training Program @ University of Antwerp
Management of Electronic Information and Digital Libraries
2. This presentation can be found at
http://questier.com
http://www.slideshare.net/Frederik_Questier
3. Main objectives
of computer security
➢ Confidentiality
➢ of data (secrecy)
➢ of persons (privacy)
➢ access only by authorized parties
➢ Integrity
➢ data only correctly modified or deleted by authorized parties
➢ Availability
➢ correctly accessible in a timely manner
➢ the failure to meet this goal is called a denial of service
4. Assignment 1
personal computer security
➢ Throughout this workshop: write down all possible ways
how your personal computer system could be
compromised. What are the possible attack vectors?
5. Assignment 2:
institutional
data security
Congratulations!
You are elected member of the newly established
computer and data security team in your institution.
1) Make a list of all possible risks that can have an impact
on the security and stability of your data and internal
and external Information & Technology services.
2) Make a list of recommendations to lower the risks.
6. What can go wrong?
Nature
➢
lightning strike
➢
fire
➢
flood
➢
heat wave – cold wave
➢
storm weather, hurricane
➢
earthquake
➢
tsunami
➢
volcano eruption
➢
electro magnetic pulse from the sun
➢
disease of key employees
7. What can go wrong?
Evil actions by people
➢
break in (hackers - crackers)
➢
social engineering
➢
phishing
➢
(identity) theft
➢
vandalism
➢
unhappy employees
➢
sabotage (time bomb)
➢
cyber attack, e.g. (Distributed) Denial of Service
➢
terrorism
➢
war
➢
nuclear bomb
8. What can go wrong?
Malware (malicious software)
➢
virus
➢
worm
➢
trojan horse
➢
rootkit
➢
spyware
➢
ransomware
➢
keylogger
➢
network sniffer
➢
back door
➢
dialer
9. What can go wrong?
Infrastructure or services problems
➢
Failure of
➢
software (bugs)
➢
hardware
➢
electricity
➢
power outage or power surge
➢
network (cable cut – saturation)
➢
airconditioning
➢
water pipes –> leak
➢
system upgrades
➢
service providers (e.g. cloud)
➢
Overload of CPU, memory, storage, network (spam)
10. What can go wrong?
Human errors
➢
Weak security
➢
Loss of laptops, smartphones, USB-sticks, …
➢
No encryption
➢
Passwords leaks or cracks
➢
Computer console left unlocked
➢
Misunderstanding computer interface or other mistakes
➢
Deleting data
➢
Corrupting data
➢
Confiscation of machines
16. Passwords
➢ Don't share them
➢ Not even with computer administrators
➢ Don't write them down
➢ Don't reuse them among different sites
➢ Change them often
➢ Select wise:
➢ Easy to remember
➢ Hard to guess (resistant to dictionary attacks)
➢ Password length
➢ Large set of characters (caps, lower case, numbers, symbols)
17. Some notorious password leaks
➢ 2014: 5M Gmail passwords
➢ 2013: 38M Adobe passwords (and source code)
➢ 2013: 250K Twitter passwords
➢ 2012: 12M Apple User IDs stolen by FBI, 1M leaked
➢ 2012: 6M LinkedIn passwords
➢ 2012: 450K plaintext Yahoo passwords
➢ 2012: 1.5M plaintext Youporn passwords
➢ 2009: 10K MS Hotmail, MSN and Live passwords
23. Danger of
biometric identification?
➢ You can't change your biometric password once it
got leaked
➢ You can't legally refuse to give it, unlike a password
(US fifth amendment)
33. Great if we can exchange
our messages encrypted!
But how can we safely
exchange our keys?
34. Symmetric encryption
Sender and receiver must both know the same secret key
How to exchange that key over distance???
Asymmetric encryption
Sender only needs to know the public key of receiver!
35. Public key encryption
The private key can unlock (decrypt)
what is locked (encrypted) with the public key
42. Digital certificates
Version #
Serial #
Signature Algorithm
Issuer Name
Validity Period
Subject Name
Subject Public Key
Issuer Unique ID
Subject Unique ID
Extensions
Digital Signature
44. ➢ CAcert.org is a community-driven certificate authority that
issues free public key certificates to the public (unlike
other certificate authorities which are commercial and sell
certificates).
➢ CAcert has over 200,000 verified users.
➢ These certificates can be used to digitally sign and encrypt
email, authenticate and authorize users connecting to
websites and secure data transmission over the Internet.
53. Virtual drive in file container
Encrypted file
container.txt
Mountable as virtual drive
/media/encrypted-disk
/Volumes/encrypted-disk
E:
56. Virtual Private Networks
extends a private (hospital) network across a public (internet) network
encrypted to protect against network sniffing
57. Internet use through a VPN provider
Sarah A. Downey, http://www.abine.com/blog/2012/petraeuss-emails-werent-private-and-neither-are-yours/
62. = The Onion Router
Free Open Source software for anonymity network
63. ➢ Bitcoin = distributed peer-to-peer crypto-currency
➢ Log of chain of digitally-signed transactions to prevent double spending
64. Edward Snowden:
“Encryption works.
Properly implemented
strong crypto systems
are one of the few
things that you can
rely on. Unfortunately,
endpoint security is so
terrifically weak that
NSA can frequently
find ways around it.”
66. You can't trust software
if its source code is hidden
➢ From the European Parliament investigation into the Echelon system (05/18/2001):
“If security is to be taken seriously, only those operating
systems should be used whose source code has been
published and checked, since only then can it be determined
with certainty what happens to the data.”
➢ Cryptographer, computer security expert Bruce Schneier:
“Secrecy and security aren't the same, even though it may
seem that way. Only bad security relies on secrecy; good
security works even if all the details of it are public."
“If researchers don’t go public, things don’t get fixed.
Companies don't see it as a security problem; they see it as a
PR problem.”
“Demand open source code for anything related to security”
67. The Borland Interbase example
➢ 1992-1994: Borland inserted intentional back door into
Interbase (closed source database server) allowing local or
remote users root access to the machine
➢ 07/2000: Borland releases source code (→ Firebird)
➢ 12/2000: Back door is discovered
72. Backups
➢
Use off-site data protection = vaulting
●
e.g. remote backup (compression, encryption!)
➢
First time and sometimes: full backup
➢
Most often: only incremental backup
➢
Use a good data retention scheme
➢
e.g. 7 daily, 4 weekly, 12 monthly, all yearly backups
➢
Reflect about your time for full restore
➢
Test the restore procedure!
➢
“80% of backups fail to restore”
82. Prepare for disasters!
Business continuity planning
= how to stay in business in the event of disaster?
➢
Disaster recovery
●
Preventive measures
●
Detective measures
●
Corrective measures
89. Credits
➢ Hacker - Hacking – Symbol.jpg, CC BY-SA, www.elbpresse.de
➢ Internet Archive, Copyright Bibliotheca Alexandrina, International School of
Information Science (ISIS), http://www.bibalex.org/isis/large/000.jpg
➢ Password Strength, Creative Commons BY-NC http://xkcd.com/936/
➢ Security, Creative Commons BY-NC http://xkcd.com/538/
➢ Zimmermann Telegram, 1917, no known copyright restrictions
➢ Assymetric and symmetric encryption by Jeremy Stretch,
http://packetlife.net/blog/2010/nov/23/symmetric-asymmetric-encryption-hashing/
➢ Orange blue public key cryptography, Creative Commons CC0 by Bananenfalter
➢ HTTPS SSL Exchange by Robb Perry,
http://coding.smashingmagazine.com/2012/05/17/backpack-algorithms-and-public-key-cryptography-made-easy/
➢ Bitcoin logo, Public Domain by bitboy
➢ Bitcoin Transaction Visual, Creative Commons CC0 by Graingert
➢ Social Icons by Iconshock http://www.iconshock.com/social-icons/