Computer and Network Security
Tom Kelliher, CS 200
Mar. 3, 2005
Read: Chapter 7.
Turn in answers to these questions: 6, 9, 23.
- ``The most secure computer is one that's kept completely unplugged,
locked away in a closet.'' It is, however, not very useful.
- billg e-mail forgery.
- University of Calgary CS courses:
Labs will be run on a ``closed'' network. Ethics?
- Virus writing (2003).
- Spam, spyware writing (2005).
- Viruses, worms, and trojans.
- What is a buffer overflow attack?
- The Nov. 2, 1988 Internet worm.
- Trojan horses: nefarious code hidden within a useful program.
Example: spyware distributed with Kazaa clients?
- Zombie armies used to launch DOS attacks.
What is a DOS attack?
- Defense: authorization and authentication systems. (?)
Weaknesses of password systems.
- The hacker ethic:
The will of the hacker is to improve the situation; there is no malicious
- Unlimited and total access to computers.
- All information should be free.
- Mistrust authority.
- Hackers should be judged by their skill in hacking, not earned
- Art and beauty can be created on a computer.
- Computers can change your life for the better.
- System security ``tools:'' Crack, Satan, TripWire.
- Online and electronic voting:
- Pentagon plan for online voting for 2004 election was cancelled in
- Benefits, risks?
Thomas P. Kelliher
Tue Mar 1 16:37:11 EST 2005