823
edits
(→Endpoints: clean up, expand a little bit) |
(→Endpoints: clean up & consolidate more) |
||
Line 21: | Line 21: | ||
=Endpoints= | =Endpoints= | ||
early security: mainframes, protecting users from each other | |||
* how a computer works | * how a computer works | ||
** picture a vast table of index cards - that is memory, it is addressable | ** picture a vast table of index cards - that is memory, it is addressable | ||
Line 62: | Line 57: | ||
** botnets: send spam, mine bitcoin, steal your identity | ** botnets: send spam, mine bitcoin, steal your identity | ||
** black market for pwnd computers, amazon accounts, etc | ** black market for pwnd computers, amazon accounts, etc | ||
** backdoors, CVEs, foxacid | |||
** because exploits are valuable, they use sparingly to avoid discovery | ** because exploits are valuable, they use sparingly to avoid discovery | ||
** updates | |||
*** always update! | |||
*** package managers are the only way | |||
*** app stores add complications: paywalls, "permission creep" | |||
** nonfree software | |||
*** microsoft, apple, google: all evil | |||
*** hall of shame: skype, silverlight, flash are all evil | |||
* defense in depth | * defense in depth | ||
** antivirus | ** antivirus |