Tuesday, October 26, 2010

Starting Security

All technology, including the internet, was designed and built by people for the use of people. This idea should always be remembered when dealing with internet security.

What is security? Protecting things of value. What has value? Anything we give value to. Recall the WoW kid and his non-understanding parent.

We did the "Dark side of the internet" slides up to Tiger Woods.

All nefarious acts on the internet have two categories: technical and social.
Recall the graph of "how to contact the person:" there were three branches: legit, tech hacking, and social engineering.

Technical (or straight hacking) defeats systems to obtain information or carry out the ill-intended deed. Social engineering is executing a con: tricking someone into giving something up. All false internet activity falls somewhere in the space defined by those two.

No comments:

Post a Comment