Topics we will cover in this class:
Terms, concepts, attacks, defenses...
Keeping your personal information private
Computer, Tablet and Phone Security
Keep your personal devices safe
Safe Internet Use
Well... as safe as it can be!
Mobile Device and Public Network Security
Mobile “smart” phones and “Hotspots” etc.
Home Wireless Network Security
Configuring and securing your home network
What is Security?
Law #1 - If a bad guy can persuade you to run his
program on your computer, it’s not your computer
Law #2 - If a bad guy can alter the operating system
on your computer, it’s not your computer anymore.
Law #3 - If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.
Law #4 - If a bad guy uploads his programs to your
favorite web site, it’s not a safe web site any more.
Law #5 - Weak passwords will be used to defeat
other strong security measures.
Law #6 - A computer or network is only as secure as
the administrator is capable and trustworthy.
Law #7 - Encrypted data is only as secure as the
Law #8 - An out of date virus scanner is only
marginally better than no virus scanner at all.
Law #9 - Absolute anonymity isn’t practical, in real life or on the web.
Law #10 - Technology is not a panacea.