EP006

Skynet Protection: episode 006

First password use and compromise (http://www.wired.com/wiredenterprise/2012/01/computer-password/)
Bugs per line of code (http://sdt.bz/content/article.aspx?ArticleID=36396&page=1)
Passwords purpose
Azimov’s 3 laws of robotics (http://en.wikipedia.org/wiki/Three_Laws_of_Robotics)
Brute force and Dictionary attacks (http://web.cs.du.edu/~mitchell/forensics/information/pass_crack.html)
Key logger (http://www.vidder.com/resources/attacks/keylogger-screen-scraper.php)
Cryptographic hash (http://en.wikipedia.org/wiki/Cryptographic_hash_function) vs hash collisions (http://en.wikipedia.org/wiki/Collision_attack)
Privilege escalation / lateral movement (http://en.wikipedia.org/wiki/Privilege_escalation)
Safe cracking time (http://home.howstuffworks.com/home-improvement/household-safety/security/safecracking4.htm)
Disk encryption with plausible deniability (http://www.truecrypt.org/docs/plausible-deniability)
stateless and Statefull firewalls (http://www.youtube.com/watch?v=9wRgvyLZOKc)
Firewall zones (image examples https://www.google.ca/search?q=firewall+zones&tbm=isch&tbo=u&source=univ&sa=X&ei=IAl4UvKfG4_gsASDr4HABA&ved=0CFUQsAQ)

1000 lines of code = 1 bug (http://www.networkworld.com/community/blog/darpa-banish-%E2%80%9Cgeeky-formal%E2%80%9D-way-code-defects-)
Iphone lock screen bypass example (https://www.google.ca/search?q=iphone+lock+screen+bypass)
Bug (http://www.history.navy.mil/photos/images/h96000/h96566k.jpg)
IDS/IPS (http://www.checkpoint.ca/securitycafe/readingroom/internal_security/ips_ids_internal_security.html)
Virus(http://www.microsoft.com/security/pc-security/virus-whatis.aspx), antivirus (http://blogs.avg.com/business/signature-based-detection/)
Heuristics (http://en.wikipedia.org/wiki/Heuristic_(computer_science)#Virus_scanning)
Worm (http://en.wikipedia.org/wiki/Computer_worm)
zero day (http://www.pctools.com/security-news/zero-day-vulnerability/)

Leave a Comment