Computer and Network Security
Tom Kelliher, CS 200
Oct. 6, 2009
Read: Chapter 7.
Turn in answers to these questions: 6, 9, 18.
Privacy.
Computer reliability.
- ``The most secure computer is one that's kept completely unplugged,
locked away in a closet.'' It is, however, not very useful.''
- billg e-mail forgery.
- University of Calgary CS courses:
- Virus writing (2003).
- Spam, spyware writing (2005).
Labs will be run on a ``closed'' network. Ethics?
- Viruses, worms, and trojans.
- What is a buffer overflow attack?
- The Nov. 2, 1988 Internet worm.
- Trojan horses: nefarious code hidden within a useful program.
Example: spyware distributed with Kazaa clients?
Add-ons distributed with main program. ``Phone home'' software.
``More'' ethical if disclosed in EULA?
- Zombie armies used to launch DOS attacks.
What is a DOS attack?
- Defense: authorization and authentication systems. (?)
Weaknesses of password systems.
- The hacker ethic:
- Unlimited and total access to computers.
- All information should be free.
- Mistrust authority.
- Hackers should be judged by their skill in hacking, not earned
degrees, etc.
- Art and beauty can be created on a computer.
- Computers can change your life for the better.
The will of the hacker is to improve the situation; there is no malicious
intent.
- System security ``tools:'' Crack, John the Ripper, Satan, TripWire,
Wireshark.
- Online and electronic voting:
- Pentagon plan for online voting for 2004 election was canceled in
Feb. 2004.
- Benefits, risks?
- 21--
Thomas P. Kelliher
2009-09-30
Tom Kelliher