Difference between revisions of "Security Overview"

Jump to navigation Jump to search
13 bytes removed ,  12:45, 15 December 2013
→‎Endpoints: clean up & consolidate more
(→‎Endpoints: clean up, expand a little bit)
(→‎Endpoints: clean up & consolidate more)
Line 21: Line 21:


=Endpoints=
=Endpoints=
* nonfree software (microsoft, apple, google: all evil)
early security: mainframes, protecting users from each other
* security updates: package managers are the only way
* app stores add complications: paywalls, "permission creep"
* how exploits work: backdoors, CVEs, black market, foxacid
* hall of shame: skype, silverlight, flash are all evil
* early security: mainframes, protecting users from each other
* how a computer works
* how a computer works
** picture a vast table of index cards - that is memory, it is addressable
** picture a vast table of index cards - that is memory, it is addressable
Line 62: Line 57:
** botnets: send spam, mine bitcoin, steal your identity
** botnets: send spam, mine bitcoin, steal your identity
** black market for pwnd computers, amazon accounts, etc
** black market for pwnd computers, amazon accounts, etc
** backdoors, CVEs, foxacid
** because exploits are valuable, they use sparingly to avoid discovery
** because exploits are valuable, they use sparingly to avoid discovery
** updates
*** always update!
*** package managers are the only way
*** app stores add complications: paywalls, "permission creep"
** nonfree software
*** microsoft, apple, google: all evil
*** hall of shame: skype, silverlight, flash are all evil
* defense in depth
* defense in depth
** antivirus
** antivirus

Navigation menu