Computer and Network Security

Tom Kelliher, CS 200

Oct. 6, 2009




Read: Chapter 7.

Turn in answers to these questions: 6, 9, 18.

From Last Time


Coming Up

Computer reliability.

Chapter Summary

  1. ``The most secure computer is one that's kept completely unplugged, locked away in a closet.'' It is, however, not very useful.''

  2. billg e-mail forgery.

  3. University of Calgary CS courses:
    1. Virus writing (2003).

    2. Spam, spyware writing (2005).

    Labs will be run on a ``closed'' network. Ethics?

  4. Viruses, worms, and trojans.
    1. What is a buffer overflow attack?

    2. The Nov. 2, 1988 Internet worm.

    3. Trojan horses: nefarious code hidden within a useful program. Example: spyware distributed with Kazaa clients?

      Add-ons distributed with main program. ``Phone home'' software.

      ``More'' ethical if disclosed in EULA?

    4. Zombie armies used to launch DOS attacks.

      What is a DOS attack?

    5. Defense: authorization and authentication systems. (?)

      Weaknesses of password systems.

  5. The hacker ethic:
    1. Unlimited and total access to computers.

    2. All information should be free.

    3. Mistrust authority.

    4. Hackers should be judged by their skill in hacking, not earned degrees, etc.

    5. Art and beauty can be created on a computer.

    6. Computers can change your life for the better.

    The will of the hacker is to improve the situation; there is no malicious intent.

  6. System security ``tools:'' Crack, John the Ripper, Satan, TripWire, Wireshark.

  7. Online and electronic voting:
    1. Pentagon plan for online voting for 2004 election was canceled in Feb. 2004.

    2. Benefits, risks?

Discussion Questions

  1. 21--

Thomas P. Kelliher 2009-09-30
Tom Kelliher