Yipee Ki Yay - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Yipee Ki Yay

Description:

'Yipee Ki Yay' Bruce Willis in 'Die Hard' (1988) http://www.imdb.com/title/tt0048960 ... HW 5 is due Today, April 11. Your HTML project is due Friday May 2 ... – PowerPoint PPT presentation

Number of Views:82
Avg rating:3.0/5.0
Slides: 13
Provided by: alcar4
Category:
Tags: bruce | willis | yay | yipee

less

Transcript and Presenter's Notes

Title: Yipee Ki Yay


1
Yipee Ki Yay
http//www.imdb.com/title/tt0048960/
  • Bruce Willis in Die Hard (1988)

2
Computer Science 101Lecture 34
author.handalak.com/.../ images/javascript.jpg
  • Fall Semester 2008
  • Friday, April 11
  • Week 13/18
  • Albert H. Carlson

3
Announcements
  • HW 5 is due Today, April 11
  • Your HTML project is due Friday May 2
  • The final is a mass final on Monday of Finals
    week, 7 9 pm in EP121

4
People in Security
  • Cyberextortionist
  • Threatens to damage, or damages, systems if not
    paid
  • Sometimes uses the DOS or DDOS
  • Cyberterrorist
  • Pretty much the same thing as a
    cyberextortionist, but does damage for political
    reasons

5
People in Security
  • The most dangerous of all hackers
  • the employee
  • Typically has one of a few motives
  • Financial Gain
  • Revenge
  • Exploit a weakness just to see if they can
  • Capable of doing GREAT harm to a system

6
Types of Attacks
  • System Failure
  • Information Theft
  • Unauthorized use and access
  • Hardware Theft
  • Software Theft (illegal copying)
  • Internet and network attacks

7
Internet and Network Attacks
  • There are lots of possible attacks
  • The internet is especially vulnerable because it
    is so open
  • Sniffing
  • Monitoring the traffic going by without doing
    anything to the data
  • Just plain a type of listening

8
Internet and Network Attacks
  • Spoofing
  • Pretending you are another, valid, user
  • May involve conversations and answering data
  • Often done with IP addressing
  • Man in the Middle
  • Lets say there are two people who want to talk
  • We will call them A and B

9
Internet and Network Attacks
  • We do NOT want to keep A from talking to B
  • Rather, we want in on the conversation

10
Internet and Network Attacks
  • What we do, as C is to start conversations with
    BOTH A and B
  • We spoof that we are B when we talk to A
  • Similarly, we spoof that we are A when we talk to
    B

11
Internet and Network Attacks
  • The idea is to get information sent to us that A
    wants sent to B, or vice versa, that they would
    normally NOT want us to see
  • Malware
  • Then we have the normal bad stuff we have talked
    about before
  • Trojan Horses with payload
  • Viruses
  • Worms
  • Etc.

12
Questions?
Write a Comment
User Comments (0)
About PowerShow.com