Difference between revisions of "CS 101/Additional Materials/Chapter 17"

From Worcester State University Computer Science Department Wiki
Jump to: navigation, search
(Cleaned up)
Line 1: Line 1:
===Computer Security===
+
== Section 17.1 Security at All Levels ==
http://explainingcomputers.com/security.html
+
This website explains all about computer security and many issues that come with security. There is also a video that goes over more detail.
+
Website updated Sept. 2012
+
Posted Dec. 5, 2015
+
Kristina Mironidis 
+
  
How A Trojan Horse Virus Works
+
http://explainingcomputers.com/security.html This website explains all about computer security and many issues that come with security. There is also a video that goes over more detail. Website updated Sept. 2012 Posted Dec. 5, 2015 Kristina Mironidis 
Here is an in depth look at how a Trojan Horse Virus works
+
http://computer.howstuffworks.com/trojan-horse.htm
+
Posted on Dec. 5, 2015
+
Matt Lanteigne
+
  
 +
http://www.pbs.org/wgbh/nova/labs/lab/cyber/ This video game is an interesting way to actively learn about cyber security. I enjoyed setting up an avatar and company who I would need to protect from cyber attacks. Who said learning can't be fun? Posted on December 5, 2015 - Antoinette Cabral
  
http://www.pbs.org/wgbh/nova/labs/lab/cyber/
+
http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure Peter Doyle Date Posted: July 2012      Date Retrieved: 12/3/2015 The article listed above is from the Federal Trade Comission and gives you instruction on protecting your personal information online. It provides precautions for things like social security number as well as banking information and the best way to keep it out of the hands of the wrong people. With people constantly trying to get others personal info online these are just some valuable steps to make it that much more difficult for others.
This video game is an interesting way to actively learn about cyber security. I enjoyed setting up an avatar and company who I would need to protect from cyber attacks. Who said learning can't be fun?
+
Posted on December 5, 2015 - Antoinette Cabral
+
  
 +
https://www.youtube.com/watch?v=6p_q_Xp--Rs This video explains the four basic principle of computer security such as integrity, confidentiality, availability and non-repudiation. Jaclyn Mason
  
--------------------------------------------------------------------------------------------------------------------------------
+
=== Information Security ===
  
http://www.forensicsciencesimplified.org/prints/how.html I was interested in the fingerprint analysis on page 548. This website goes into more detail regarding fingerprint processes. It explains how the prints are collected and examined. -Jess Krafft
+
== Section 17.2 Preventing Unauthorized Access ==
  
http://www.consumer.ftc.gov/topics/computer-security This is a government run site that educates about computer security and warns about scams of free security and where to get it safely. -Nicole Berry
+
=== Passwords ===
  
{{#ev:youtube|fNC3jCCGJ0o}} This clip gives you basic of the Cryptography. Date published 04-25-13. Date added 05-02-15. Leon Ngo
+
=== CAPTHCHA ===
  
https://www.youtube.com/watch?v=0p3787JiFgQ
+
=== Fingerprint Analysis ===
  
Nov. 25, 2015-Dec. 02, 2016
+
http://www.forensicsciencesimplified.org/prints/how.html I was interested in the fingerprint analysis on page 548. This website goes into more detail regarding fingerprint processes. It explains how the prints are collected and examined. -Jess Krafft
  
This video gives a modern take on actual attacks that have occurred recently. By using informations that we have learned from the chapter it discusses how they have gain access to major companies and why they become so high profile.  This is a good way to put everything into perspective that the chapters have tried to convey how seriously computer security is. Zachary Nader.
+
== Section 17.3 Malicious Code ==
---------------------------------------------------------------------------------------------------------------------------------
+
http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure
+
+
Peter Doyle
+
  
Date Posted: July 2012      Date Retrieved: 12/3/2015
+
How A Trojan Horse Virus Works Here is an in depth look at how a Trojan Horse Virus works http://computer.howstuffworks.com/trojan-horse.htm Posted on Dec. 5, 2015 Matt Lanteigne
  
The article listed above is from the Federal Trade Comission and gives you instruction on protecting your personal information online. It provides precautions for things like social security number as well as banking information and the best way to keep it out of the hands of the wrong people. With people constantly trying to get others personal info online these are just some valuable steps to make it that much more difficult for others.
+
=== Antivirus Software ===
  
------------------------------------------------------------------------------------------
+
=== Security Attacks ===
https://www.youtube.com/watch?v=6p_q_Xp--Rs
+
  
This video explains the four basic principle of computer security such as integrity, confidentiality, availability and non-repudiation.
+
https://www.youtube.com/watch?v=0p3787JiFgQ Nov. 25, 2015-Dec. 02, 2016 This video gives a modern take on actual attacks that have occurred recently.  By using informations that we have learned from the chapter it discusses how they have gain access to major companies and why they become so high profile.  This is a good way to put everything into perspective that the chapters have tried to convey how seriously computer security is. Zachary Nader.
  
Jaclyn Mason
+
== Section 17.4 Cryptography ==
  
 +
https://www.youtube.com/watch?v=fNC3jCCGJ0o This clip gives you basic of the Cryptography. Date published 04-25-13. Date added 05-02-15. Leon Ngo
 +
 +
== Section 17.5 Protecting Your Information Online ==
 +
 +
http://www.consumer.ftc.gov/articles/0009-computer-security 12/7/2015 This resource offers a simple lsit of ways to limit the risk of computer interactions and increase security. Most of the items are common sense but they are good baselines to start with and get used to in all areas of life.
 +
 +
http://www.consumer.ftc.gov/topics/computer-security This is a government run site that educates about computer security and warns about scams of free security and where to get it safely. -Nicole Berry
  
 +
=== Security and Portable Devices ===
  
http://www.consumer.ftc.gov/articles/0009-computer-security
+
=== WikiLeaks ===
12/7/2015
+
This resource offers a simple lsit of ways to limit the risk of computer interactions and increase security. Most of the items are common sense but they are good baselines to start with and get used to in all areas of life.
+

Revision as of 16:06, 25 March 2016

Section 17.1 Security at All Levels

http://explainingcomputers.com/security.html This website explains all about computer security and many issues that come with security. There is also a video that goes over more detail. Website updated Sept. 2012 Posted Dec. 5, 2015 Kristina Mironidis

http://www.pbs.org/wgbh/nova/labs/lab/cyber/ This video game is an interesting way to actively learn about cyber security. I enjoyed setting up an avatar and company who I would need to protect from cyber attacks. Who said learning can't be fun? Posted on December 5, 2015 - Antoinette Cabral

http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure Peter Doyle Date Posted: July 2012 Date Retrieved: 12/3/2015 The article listed above is from the Federal Trade Comission and gives you instruction on protecting your personal information online. It provides precautions for things like social security number as well as banking information and the best way to keep it out of the hands of the wrong people. With people constantly trying to get others personal info online these are just some valuable steps to make it that much more difficult for others.

https://www.youtube.com/watch?v=6p_q_Xp--Rs This video explains the four basic principle of computer security such as integrity, confidentiality, availability and non-repudiation. Jaclyn Mason

Information Security

Section 17.2 Preventing Unauthorized Access

Passwords

CAPTHCHA

Fingerprint Analysis

http://www.forensicsciencesimplified.org/prints/how.html I was interested in the fingerprint analysis on page 548. This website goes into more detail regarding fingerprint processes. It explains how the prints are collected and examined. -Jess Krafft

Section 17.3 Malicious Code

How A Trojan Horse Virus Works Here is an in depth look at how a Trojan Horse Virus works http://computer.howstuffworks.com/trojan-horse.htm Posted on Dec. 5, 2015 Matt Lanteigne

Antivirus Software

Security Attacks

https://www.youtube.com/watch?v=0p3787JiFgQ Nov. 25, 2015-Dec. 02, 2016 This video gives a modern take on actual attacks that have occurred recently. By using informations that we have learned from the chapter it discusses how they have gain access to major companies and why they become so high profile. This is a good way to put everything into perspective that the chapters have tried to convey how seriously computer security is. Zachary Nader.

Section 17.4 Cryptography

https://www.youtube.com/watch?v=fNC3jCCGJ0o This clip gives you basic of the Cryptography. Date published 04-25-13. Date added 05-02-15. Leon Ngo

Section 17.5 Protecting Your Information Online

http://www.consumer.ftc.gov/articles/0009-computer-security 12/7/2015 This resource offers a simple lsit of ways to limit the risk of computer interactions and increase security. Most of the items are common sense but they are good baselines to start with and get used to in all areas of life.

http://www.consumer.ftc.gov/topics/computer-security This is a government run site that educates about computer security and warns about scams of free security and where to get it safely. -Nicole Berry

Security and Portable Devices

WikiLeaks