CS 101/Additional Materials/Chapter 17

From Worcester State University Computer Science Department Wiki
< CS 101‎ | Additional Materials
Revision as of 16:06, 25 March 2016 by Karl Wurst (Talk | contribs) (Cleaned up)

Jump to: navigation, search

Section 17.1 Security at All Levels

http://explainingcomputers.com/security.html This website explains all about computer security and many issues that come with security. There is also a video that goes over more detail. Website updated Sept. 2012 Posted Dec. 5, 2015 Kristina Mironidis

http://www.pbs.org/wgbh/nova/labs/lab/cyber/ This video game is an interesting way to actively learn about cyber security. I enjoyed setting up an avatar and company who I would need to protect from cyber attacks. Who said learning can't be fun? Posted on December 5, 2015 - Antoinette Cabral

http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure Peter Doyle Date Posted: July 2012 Date Retrieved: 12/3/2015 The article listed above is from the Federal Trade Comission and gives you instruction on protecting your personal information online. It provides precautions for things like social security number as well as banking information and the best way to keep it out of the hands of the wrong people. With people constantly trying to get others personal info online these are just some valuable steps to make it that much more difficult for others.

https://www.youtube.com/watch?v=6p_q_Xp--Rs This video explains the four basic principle of computer security such as integrity, confidentiality, availability and non-repudiation. Jaclyn Mason

Information Security

Section 17.2 Preventing Unauthorized Access

Passwords

CAPTHCHA

Fingerprint Analysis

http://www.forensicsciencesimplified.org/prints/how.html I was interested in the fingerprint analysis on page 548. This website goes into more detail regarding fingerprint processes. It explains how the prints are collected and examined. -Jess Krafft

Section 17.3 Malicious Code

How A Trojan Horse Virus Works Here is an in depth look at how a Trojan Horse Virus works http://computer.howstuffworks.com/trojan-horse.htm Posted on Dec. 5, 2015 Matt Lanteigne

Antivirus Software

Security Attacks

https://www.youtube.com/watch?v=0p3787JiFgQ Nov. 25, 2015-Dec. 02, 2016 This video gives a modern take on actual attacks that have occurred recently. By using informations that we have learned from the chapter it discusses how they have gain access to major companies and why they become so high profile. This is a good way to put everything into perspective that the chapters have tried to convey how seriously computer security is. Zachary Nader.

Section 17.4 Cryptography

https://www.youtube.com/watch?v=fNC3jCCGJ0o This clip gives you basic of the Cryptography. Date published 04-25-13. Date added 05-02-15. Leon Ngo

Section 17.5 Protecting Your Information Online

http://www.consumer.ftc.gov/articles/0009-computer-security 12/7/2015 This resource offers a simple lsit of ways to limit the risk of computer interactions and increase security. Most of the items are common sense but they are good baselines to start with and get used to in all areas of life.

http://www.consumer.ftc.gov/topics/computer-security This is a government run site that educates about computer security and warns about scams of free security and where to get it safely. -Nicole Berry

Security and Portable Devices

WikiLeaks