1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
First big change in policing
1928 2 officers rigged glass tubes and copperware in a Detroit squad car
call box
was the old method to getting calls for crimes
Tech myths cleaning
clean security footage. 2. hacking is often portrayed as evildoers most are white hat hackers. 3. tracking it perphs of digital crimes, cellphones can’t be differentiated voicemail can’t be trusted or verified. every element of a phone can be duplicated. 4. encryption. 5. DNA testing
role of AI
AI allows machines to perform tasks that usually require human intelligence including making decisions, recognizing human speech, and visual elements, and translating language.
AI in cyber
helps to critically protect online systems. can be used for automated threat detecting, generating alerts, identifying new strands of malware, and protecting business-sensitive data.
Benefits of AI in CS
deep learning, machine learning, natural language processing, reasoning.
AI Now:
used in human resources, IT departments, onboard new employees, providing resources, etc.
Automating
helps organizations identify and correct potential deficiencies in security strategy. able to implement formalized procedures that result in a more secure IT environment
Money Laundering
process of disguising money obtained through illegal activity to appear it come from legitimate sources.
why launder money?
it pays expenses for an illegal activity you can invest proceeds. it boosts illegal activity. it sustainsa luxurious lifestyle
who launders money?
Terriots, businesspeople, politicians, drug dealers, mercenaries.
Bluebox
illegal electronic device capable of duplicating multiple frequency dialing system developed by AT&T
Malware
a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
Virus
a malicious piece of code that spreads itself from file to file. needs a host a file
types of viruses
program, boot and macro
worms
malicious piece of code that spreads itself from computer to computer from vulnerabilities. doesn’t need a host file and spreads without user interaction via email, LAN, internet.
malicious scripts
written in javascript, VB script, active x, flash, etc, and can be hidden in emails or websites.
Backdoors and rootkits
secret entry points: into a program/system that allows someone to gain access without going through security.
Backdoors
usually left by programmers for debugging and testing purposes, intentionally or unintentionally.
rootkits
installed by an attacker after gaining root/admin access. it modifies the entire system and avoids detection.
logic bombs
code programmed to be activated on a specific date, time, or circumstances. often combined with a virus/worm.
Blended Threats
Advanced software that combines viruses, worms, trojans, and malicious scripts. exploits one or many vulnerabilities in programs or operating systems.
RFID Cards
cards used in metros, sport venue, building security, healthcare, retial, education and more.