Chapter 2: Computing Security and Ethics
- Computing security is important
- Intruders
- hackers (or crackers)
- did it exist before the internet?
- phreaking (phone system hacking)
- Undirected vs directed hackers
- script kiddie
- hacktivism
- anonymous & lulzsec
- bad security practices, and holes in the system
- backdoors
- buffer overflow
- viruses, worms, bots, and trojans
- social engineering
- dumpster diving
- access
- modification
- DOS
- repudation
- vulnerability vs threat
- vulnerability
- sensitivity of the information
- Only the paranoid survive
- security policies
- physical safe guards
- passwords
- destroy old stuff
- backups
- system failures
- AUP
- VPN
- Anti-virus
- DRP
- complexity
- time to guess by hand vs. machine
- virus signatures
- honeypots
- heuristics
- checksums
- certificates
- symmetric encryption
- asymmetric encryption
- packet filtering
- proxy firewall
- routers
- DMZ
- machine addressing (NAT)
- Crimes
- copyright
- patent
- trade secret
- reverse engineering
- prosecution
- ACM Code of ethics and professional conduct
- piracy
- viruses and virus hoxes
- weak passwords
- plagiarism
- cracking
- health issues