CS 101/Additional Materials/Chapter 17
- 1 Section 17.1 Security at All Levels
- 2 Section 17.2 Preventing Unauthorized Access
- 3 Section 17.3 Malicious Code
- 4 Section 17.4 Cryptography
- 5 Section 17.5 Protecting Your Information Online
Section 17.1 Security at All Levels
http://explainingcomputers.com/security.html This website explains all about computer security and many issues that come with security. There is also a video that goes over more detail. Website updated Sept. 2012 Posted Dec. 5, 2015 Kristina Mironidis
http://www.pbs.org/wgbh/nova/labs/lab/cyber/ This video game is an interesting way to actively learn about cyber security. I enjoyed setting up an avatar and company who I would need to protect from cyber attacks. Who said learning can't be fun? Posted on December 5, 2015 - Antoinette Cabral
http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure Peter Doyle Date Posted: July 2012 Date Retrieved: 12/3/2015 The article listed above is from the Federal Trade Comission and gives you instruction on protecting your personal information online. It provides precautions for things like social security number as well as banking information and the best way to keep it out of the hands of the wrong people. With people constantly trying to get others personal info online these are just some valuable steps to make it that much more difficult for others.
https://www.youtube.com/watch?v=6p_q_Xp--Rs This video explains the four basic principle of computer security such as integrity, confidentiality, availability and non-repudiation. Jaclyn Mason
http://www.forensicsciencesimplified.org/prints/how.html I was interested in the fingerprint analysis on page 548. This website goes into more detail regarding fingerprint processes. It explains how the prints are collected and examined. -Jess Krafft
Section 17.3 Malicious Code
How A Trojan Horse Virus Works Here is an in depth look at how a Trojan Horse Virus works http://computer.howstuffworks.com/trojan-horse.htm Posted on Dec. 5, 2015 Matt Lanteigne
https://www.youtube.com/watch?v=0p3787JiFgQ Nov. 25, 2015-Dec. 02, 2016 This video gives a modern take on actual attacks that have occurred recently. By using informations that we have learned from the chapter it discusses how they have gain access to major companies and why they become so high profile. This is a good way to put everything into perspective that the chapters have tried to convey how seriously computer security is. Zachary Nader.
Section 17.4 Cryptography
https://www.youtube.com/watch?v=fNC3jCCGJ0o This clip gives you basic of the Cryptography. Date published 04-25-13. Date added 05-02-15. Leon Ngo
Section 17.5 Protecting Your Information Online
http://www.consumer.ftc.gov/articles/0009-computer-security 12/7/2015 This resource offers a simple lsit of ways to limit the risk of computer interactions and increase security. Most of the items are common sense but they are good baselines to start with and get used to in all areas of life.
http://www.consumer.ftc.gov/topics/computer-security This is a government run site that educates about computer security and warns about scams of free security and where to get it safely. -Nicole Berry