IT Quiz

advertisement
Phishing: To gain money, send emails that trick the user.
Phishing and the web: email directing to look-a-like site
Phreaking: misusing telecommunication. Started by John Draper(captain crunch)/ Phone+freak
Early 1970s he taught 2 phreaking wannabe his skills
Pharming: mistyping website address or hacker redirecting to their fake web. Pharmer then tries to gain
your info when you type into the fake site.
Phishing and Pharming are mostly “Social Engineering”
When hackers get involved things get trickier.
Hacking is finding technical weaknesses in a computer system, computer network, or software program
and exploiting or misusing it.
Hacker: someone who hacks and has an advanced understanding of computers and its networks. They
are motivated by profit, protest, or challenge.
Different Wares:
Wares: are manufactured articles of a specified type.
In computing there are:
-
Hardware
Software
Malware
Types of Malware:
-
Viruses
Trojans
Worms
Spyware
Ransomware
Network Malware:
Botnet infections?
Cyber battles:
The (in)famous stuxnet virus?
Rules for cyberwar set out in Nato manual
Spyware:
No tech hacking: Shoulder surfing
Spyware: hardware or software collects various types of personal info, such as internet browser
histories, email, contacts and passwords. It can also control your computer in other ways, such as
installing additional software and redirecting your browser to different sites.
Spyware could be in USB. “Big brother is watching you”. Edward Snowden revealed US(NSA) and
Britain’s future plan of surveillance. Anti-privacy activist.
Things to do to be safe with our IT tools: download a trusted anti-virus program such as McAffe, Norton
Symantec, AVG.
Personal Anti-Malware action plan: Use antivirus software, update and scan frequently, use strong
password(important).
Strong password: has at least 15 characters, uppercase and lowercase letters, numbers, and symbols.
Are all hackers bad people? “black vs. white hat”
At age 12, Kevin Mitnick used social engineering to bypass the paper ticket system used in the LA bus
system. Social engineering became his primary method of obtaining info like usernames, passwords and
modem phone numbers. He was sent to 5 five years in prison because according to Mitnick the law
enforcement officials were convinced he had the ability to “start a nuclear war by whistling into a pay
phone”. He now runs Mitnick security consulting, a computer security company.
Hacktivism: Hacker+ Activism, in the use of computers and its networks as a means to protest to
promote social or political ends.
Anonymous: internet meme that originated in 2003 in 4chan representing the concept of many online
and offline community users simultaneously existing as an anarchic digitized global brain. The people’s
identity are not known.
Anonymous came from Guy Fawkes. In 1605 13 young men planned to blow up the houses of
parliament with barrels of gunpowder among them was Guy Fawkes, Britain’s most notorious traitor. He
was caught tortured and executed.
Privacy, copy right and ethics:
Global average privacy rate for PC software hovers at 42%. User who say they pirate the most and
largely male and young.
Ethics: Moral code, values, rights and wrongs, ideals, standards of behavior, virtues, and dictates of
conscience.
Computer ethics: “piracy kills music”
Church of Kopimism was founded by 19 year old philosophy student Isak Gerson. Member are file
sharers who believe that copying info is a sacred virtue. Based in Sweden, it has been officially
recognized by the Swedish government as a religious community.
Computer Ethics: copy right, piracy, theft, plagiarism, personal conduct.
Computer Hardware:
Computers started in 1940s and 1950s, they evolved slowly and were based on earlier older
technologies. The first computers were huge and we spoke with them using typewriters called
Terminals. These were connected directly to the big computer or In 60s, 70s, 80s you could “dial in”
using a Modem.
QWERTY keyboard
QWERTY key mapping: very early keyboards used a simple alphabetic layout: A, B, C.… Very soon
though people could type faster than the machines could handle so they arranged it as QWERTY to force
you to type more slowly so that the machines would not jam.
QWERTY was designed with the most common letters spread far apart and on both sides to prevent
frequent jams in the typewriter. Famous case of open standards because it is widespread. QWERTY
example of the network effect(tied with the number of people who own or use it).
Network effect: the more people using something makes it more valuable to everyone.
Anti-network effect: the fewer people using something makes it less valuable.
Ecosystem
Chips are made of sand
CPU(central processing unit) also called “processor” “processing unit”
Multicore CPU: if increasing the size or speed more in a single core CPU it will consume more power
and generate more heat and ect.
New strategy of silicon valley is lots of little processors instead of one big one.
1 Hertz: 1 cycle per second
Core: brain of the CPU
Memory
Binary numbers:
Bit= Binary digIT, 1 byte= 8 bits
ASCII: characters(letters) to binary
2 Types of memories:
-
Short term memory: RAM
Long term or non-volatile storage: Hard disk drives, USB also called flash or NAND memory
Disk fragmentation
Defragmentation puts files back together
RAM: nanoseconds, flash: microseconds, hard disks: milliseconds
Peripheral: external devices connected to computer
Download