Computer and Network Security
Tom Kelliher, CS 200
Oct. 6, 2009
Read: Chapter 7.
Turn in answers to these questions: 6, 9, 18.
- ``The most secure computer is one that's kept completely unplugged,
locked away in a closet.'' It is, however, not very useful.''
- billg e-mail forgery.
- University of Calgary CS courses:
Labs will be run on a ``closed'' network. Ethics?
- Virus writing (2003).
- Spam, spyware writing (2005).
- Viruses, worms, and trojans.
- What is a buffer overflow attack?
- The Nov. 2, 1988 Internet worm.
- Trojan horses: nefarious code hidden within a useful program.
Example: spyware distributed with Kazaa clients?
Add-ons distributed with main program. ``Phone home'' software.
``More'' ethical if disclosed in EULA?
- Zombie armies used to launch DOS attacks.
What is a DOS attack?
- Defense: authorization and authentication systems. (?)
Weaknesses of password systems.
- The hacker ethic:
The will of the hacker is to improve the situation; there is no malicious
- Unlimited and total access to computers.
- All information should be free.
- Mistrust authority.
- Hackers should be judged by their skill in hacking, not earned
- Art and beauty can be created on a computer.
- Computers can change your life for the better.
- System security ``tools:'' Crack, John the Ripper, Satan, TripWire,
- Online and electronic voting:
- Pentagon plan for online voting for 2004 election was canceled in
- Benefits, risks?
Thomas P. Kelliher