Date post: | 13-Feb-2017 |
Category: |
Technology |
Upload: | jessica-fan |
View: | 1,027 times |
Download: | 2 times |
2
“the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or
misdirection of the services they provide”
Computer security, also known as cybersecurity or IT security, is:
Cyber Security
Gasser, Morrie (1988). Building a Secure Computer System
7
…the vents started blasting cold air at the maximum setting …. ..Then the windshield wipers turned on and wiper fluid blurred the glass..
..Immediately my accelerator stopped working… ..I could see an 18-wheeler approaching in my rearview mirror..
…The most disturbing maneuver came when they
cut the Jeep’s brakes, leaving me frantically pumping the pedal as the 2-ton SUV slid
uncontrollably into a ditch….
8
.… pulled out a small black device …. then reached down, opened the door and climbed into my car….
Toronto Police Service Broadcast time: 15:09 Thursday, April 9, 2015 … Investigators believe that the suspect(s) may have access to electronic devices which can compromise an SUV's security system….
18
http://www.tripwire.com/state-of-security/wp-content/uploads/Tripwire_2015_Verizon_Attack_Vectors_infographic.png http://cdn.swcdn.net/creative/v3.2/infographics/solarwinds_continuous_monitoring_cyber_infographic.png https://mywebsitesecurity.files.wordpress.com/2015/02/sitelock-howtobeatawebhacker-infographic-v6_s.jpg http://www.fico.com/en/blogs/wp-content/uploads/2015/03/Cybersecurity-gap.png http://maxcdn.jaypeeonline.net/wp-content/uploads/2013/10/elegant-free-flat-icons.jpg http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ http://makezine.com/2015/08/14/block-car-door-relay-hack-faraday-cage/ http://securityaffairs.co/wordpress/41253/cyber-crime/mitm-attacks-emv-cards.html http://www.wired.com/2015/08/hackers-tiny-device-unlocks-cars-opens-garages/ http://hothardware.com/ContentImages/NewsItem/35459/content/WD_MyPassport_Ultra.jpg http://www.theregister.co.uk/2015/10/20/western_digital_bad_hard_drive_encryption/ http://www.intego.com/mac-security-blog/ios-9-can-now-finally-be-remotely-jailbroken-but-you-cant-do-it/ http://ios8pangu.com/ http://www.digitaltrends.com/photography/could-you-fall-victim-to-crime-simply-by-geotagging-location-info-to-your-photos/ http://www.keloland.com/newsdetail.cfm/metadata-shows-gps-location-on-photos-posted-online/?id=155750 http://petapixel.com/2012/12/03/exif-data-may-have-revealed-location-of-fugitive-billionaire-john-mcafee/ http://www.nbcchicago.com/news/tech/geotagging-facebook-twitter--137537933.html http://www.imore.com/how-to-turn-off-photo-geotagging-protect-privacy-iphone-ipad http://fossbytes.com/what-is-this-feature-named-wifi-sense-in-windows-10/ http://thehackernews.com/2015/07/windows-10-wi-fi-sense-explained-actual.html http://www.rockpapershotgun.com/2015/07/28/windows-10-wifi-sharing/ http://www.zdnet.com/article/lenovo-rootkit-ensured-its-software-could-not-be-deleted/ http://thehackernews.com/2015/08/lenovo-rootkit-malware.html http://securityaffairs.co/wordpress/40440/digital-id/lenovo-tracking-application-3.html http://www.extremetech.com/computing/218437-dell-laptops-may-have-a-lenovo-superfish-size-security-problem http://thenextweb.com/insider/2015/08/12/lenovo-used-a-hidden-windows-feature-to-ensure-its-software-could-not-be-deleted/ http://new.office-watch.com/2015/image-privacy-breach-in-microsoft-office/ https://books.google.ca/books?isbn=1604422564 - John M. Barkett - 2009 - The Ethics of E-Discovery - Page 101 https://www.maketecheasier.com/remove-windows-8-metadata/ http://what-when-how.com/windows-forensic-analysis/file-analysis-windows-forensic-analysis-part-6/ http://www.casi.org.uk/discuss/2003/msg00457.html http://www.ummah.com/forum/archive/index.php/t-27608.html?s=a85a020c240a60bdf823f4a716be882d http://www.nytimes.com/2015/04/16/style/keeping-your-car-safe-from-electronic-thieves.html?_r=0 https://forums.finalgear.com/automotive-news/all-your-cars-are-belong-to-us-56432/page-4/ http://hackaday.com/2013/06/05/ask-hackaday-how-are-these-thieves-exploiting-automotive-keyless-entry/ http://www.itgovernanceusa.com/blog/wp-content/uploads/2015/09/AGCS_Cyber_Crime_full.jpg