Tom Kelliher, CS 102
Sept. 17, 2003
PowerPoint assignment due Friday. E-mail attachment before class.
Read 2.6--2.10. Questions on pp. 93--94: 13, 14, 17, and 18.
- Introduction to safe computing.
- Important to control our cyber-selves and secure our PCs.
- Identity theft.
- Loss of data through hacking.
- Responsibility to secure PCs. Incrimination?
- History of hacking. In the beginning, hacking was a good thing.
Mentality of hackers.
- Acceptable Use Policies/Terms of Service
- No spam.
- No commercial use.
- No illegal activity.
- No excessive use of resources.
- No damage.
- Right to cut you off.
- No re-selling of service.
- Limit on number of nodes in a home network.
- Never reveal.
- Choose good passwords. How to choose?
- How many to use? How often to change? Why?
- Anonymizers and throw-away e-mail addresses as tools.
- Social engineering as a hacker's tool.
- Safe computing:
- Viruses, trojans, worms; what are they?
(Come as disguised executables in e-mail, DOS attacks via ``drones,''
SQL Slammer: three minutes after release was scanning 55 million hosts
per sec. Worldwide damage within 10 minutes.)
Macro viruses, script viruses.
- Prevention: virus scanning software:
- Config to check everything.
- Auto-download updates.
- Be paranoid.
- More prevention: firewall:
- Types of protection: inbound blocking, outbound monitoring.
- Basics of networks: workstations, routers, DNS/IP, ports.
- How they work.
- Spyware. In KaZaA.
- Is ICF enough?
- Free firewall: Zone Alarm.
Symantec has Norton Personal Firewall.
Thomas P. Kelliher
Tue Sep 16 16:16:31 EDT 2003