CS 101/Additional Materials/Chapter 17

From Worcester State University Computer Science Department Wiki
Jump to: navigation, search

Section 17.1 Security at All Levels

http://explainingcomputers.com/security.html This website explains all about computer security and many issues that come with security. There is also a video that goes over more detail. Website updated Sept. 2012 Posted Dec. 5, 2015 Kristina Mironidis

http://www.pbs.org/wgbh/nova/labs/lab/cyber/ This video game is an interesting way to actively learn about cyber security. I enjoyed setting up an avatar and company who I would need to protect from cyber attacks. Who said learning can't be fun? Posted on December 5, 2015 - Antoinette Cabral

http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure Peter Doyle Date Posted: July 2012 Date Retrieved: 12/3/2015 The article listed above is from the Federal Trade Comission and gives you instruction on protecting your personal information online. It provides precautions for things like social security number as well as banking information and the best way to keep it out of the hands of the wrong people. With people constantly trying to get others personal info online these are just some valuable steps to make it that much more difficult for others.

https://www.youtube.com/watch?v=6p_q_Xp--Rs This video explains the four basic principle of computer security such as integrity, confidentiality, availability and non-repudiation. Jaclyn Mason

Information Security

Section 17.2 Preventing Unauthorized Access

Passwords

CAPTHCHA

How CAPTCHA Works - http://computer.howstuffworks.com/captcha.htm A brief overview of what CAPTCHA is all about. It also provides reasons as to why it is necessary to use. Date Created: Unknown. Date Added: 4/26/2016 - Samantha Stuart

Fingerprint Analysis

http://www.forensicsciencesimplified.org/prints/how.html I was interested in the fingerprint analysis on page 548. This website goes into more detail regarding fingerprint processes. It explains how the prints are collected and examined. -Jess Krafft

Section 17.3 Malicious Code

How A Trojan Horse Virus Works Here is an in depth look at how a Trojan Horse Virus works http://computer.howstuffworks.com/trojan-horse.htm Posted on Dec. 5, 2015 Matt Lanteigne

Antivirus Software

http://www.howtogeek.com/125650/htg-explains-how-antivirus-software-works/ This article briefly and concisely explains how anti-virus software works. This was particularly useful, as the textbook only mentions anti-virus software and two approaches to how it detects viruses, but nothing else. Article was published 10/1/12. Zackery Squires 4/30/2016

Security Attacks

https://www.youtube.com/watch?v=0p3787JiFgQ Nov. 25, 2015-Dec. 02, 2016 This video gives a modern take on actual attacks that have occurred recently. By using informations that we have learned from the chapter it discusses how they have gain access to major companies and why they become so high profile. This is a good way to put everything into perspective that the chapters have tried to convey how seriously computer security is. Zachary Nader.

Section 17.4 Cryptography

https://www.youtube.com/watch?v=fNC3jCCGJ0o This clip gives you basic of the Cryptography. Date published 04-25-13. Date added 05-02-15. Leon Ngo

Public Key Cryptography Overview https://www.youtube.com/watch?v=HubAvQg6SPM (originally uploaded on 10/12/13) This video provides a quick overview of one of the most commonly used cryptography methods, public key. - Andrew Lund (4/29/16)

Section 17.5 Protecting Your Information Online

http://www.consumer.ftc.gov/articles/0009-computer-security This website shows a simple list of ways to limit the risk of computer interactions and increase security. Most of the items are common sense but they are good baselines to start with and get used to in all areas of life. Christopher Phethean 5/3/2016

http://www.consumer.ftc.gov/topics/computer-security This is a government run site that educates about computer security and warns about scams of free security and where to get it safely. -Nicole Berry

Security and Portable Devices

WikiLeaks

https://wikileaks.org This is the official website for wikileaks. ADDED BY Kylie Sauter 3 MAY 2016