Computer and Network Security
Tom Kelliher, CS 200
Mar. 15, 2009
 
Read: Chapter 7.
Turn in answers to these questions: 6, 9, 18.
Privacy.
Computer reliability.
- ``The most secure computer is one that's kept completely unplugged,
locked away in a closet.''  It is, however, not very useful.
 
- billg e-mail forgery.
 
- University of Calgary CS courses:
   
- Virus writing (2003).
 
- Spam, spyware writing (2005).
 
Labs will be run on a ``closed'' network.  Ethics?
 
- Viruses, worms, and trojans.
   
- What is a buffer overflow attack?
 
- The Nov. 2, 1988 Internet worm.
 
- Trojan horses: nefarious code hidden within a useful program.
   Example: spyware distributed with Kazaa clients?
Add-ons distributed with main program.  ``Phone home'' software.
``More'' ethical if disclosed in EULA?
 
- Zombie armies used to launch DOS attacks.
What is a DOS attack?
 
- Defense: authorization and authentication systems.  (?)
Weaknesses of password systems.
 
 
- The hacker ethic:
   
- Unlimited and total access to computers.
 
- All information should be free.
 
- Mistrust authority.
 
- Hackers should be judged by their skill in hacking, not earned
   degrees, etc.
 
- Art and beauty can be created on a computer.
 
- Computers can change your life for the better.
 
The will of the hacker is to improve the situation; there is no malicious
intent.
 
- System security ``tools:''  Crack, John the Ripper, Satan, TripWire,
  Wireshark.
 
- Online and electronic voting:
   
- Pentagon plan for online voting for 2004 election was canceled in
   Feb. 2004.
 
- Benefits, risks?
 
 
- 21--
 
Thomas P. Kelliher
2009-03-04
Tom Kelliher