CMPT 100 Lecture Notes - Keystroke Logging, File Sharing, Wi-Fi
Document Summary
It is important to update definitions on a daily basis. Lesson: one can"t just rely on technology to defend against system attacks. Patches are afterthoughts-someone has already exploited the hole! Myth: there"s nothing on my computer anyone would want. That may be true for most citizens. However, citizens may use different ip addresses to perform illegal tasks. Most computers are faster than they need to be today. The faster the cpu, the less likely that the victim will notice the system is being used for an attack or to move files. Low security and poor policy: home computers are especially unlikely to have all current patches installed or to be set up to operate in a reasonably secure fashion. Many (perhaps the majority) are neither technically gifted, nor well trained. An attack that has been automated for mass-mail social engineering. Old hard drives, floppy disks, or cds. Packing material from a new computer with system details.