Presentation on how to chat with PDF using ChatGPT code interpreter
Privacy, Security
1.
2. It all depends on your perspective!
Dear Tech Support:
Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and
noticed a slowdown in the overall performance, particularly
in the flower and jewelry applications that had operated
flawlessly under Boyfriend 5.0. In addition, Husband 1.0 un-
installed many other valuable programs, such as Romance
9.5and Personal Attention 6.5, but installed undesirable
programs such as NFL5.0 and NBA 3.0. And now Conversation
8.0 no longer runs and House Cleaning2.6 simply crashes the
system. I've tried running Nagging 5.3 to fix these problems,
but to no avail. What can I do?
Signed,
Desperate
2
3. Dear Desperate:
First keep in mind - Boyfriend 5.0 is an entertainment package, while
Husband 1.0 is an operating system. Try entering the Command
C:I THOUGHTYOU LOVED ME and download Tears 6.2 to install Guilt
3.0. If all works as designed, Husband 1.0 should then automatically
run the applications Jewelry 2.0 and Flowers 3.5. But remember,
overuse can cause Husband 1.0 to default to Grumpy Silence 2.5,
Happy Hour 7.0 or Beer 6.1. Beer 6.1 is a very bad program that will
create SnoringLoudly.wav files. Whatever you do, DO NOT install
Mother-in-Law 1.0 or reinstall another Boyfriend program. These are
not supported applications and will crash Husband 1.0. In summary,
Husband1.0 is a great program, but it does have a limited memory
and cannot learn new applications quickly. You might consider
additional software to improve memory and performance. I
personally recommend Great Food 3.0 and Lingerie 6.9.
Good Luck! Tech Support
3
4. Security vulnerabilities or security holes
› Software bugs that allow violations of
information security
Software patches
› Corrections to software bugs that cause security
holes
Piracy
› The illegal copying, use, and distribution of
digital intellectual property
4
5. Common forms of authentication
› Something you know
Password or personal identification number
(PIN)
› Something you have
ID cards, smartcards, badges, keys,
› Something about you
Unique physical characteristics such as
fingerprints
5
6. Username
› Identifies a user to the computer system
Password
› A combination of characters known only to
the user that is used for authentication
Strongest passwords
› Minimum of eight characters in length
› Do not include any known words or names
6
8. Biometrics
› The science and technology of
authentication by scanning and
measuring a person’s unique
physical features
Facial pattern recognition
› Uses mathematical technique to
measure the distances between 128
points on the face
Retinal scanning
Biometrics Video
What does the future hold?
8
9. California Bill to Blur Google Earth
Google Flu Trends
Just how much data does Google have
about us…and how long do they maintain
it?
› Google used to store such data for 18
months, but has now trimmed that duration to
nine months. Until two years ago, Google had
kept personally identifiable information about its
Web for an indefinite amount of time
9
10. Intrusion detection software
Access control defines who
analyzes network traffic, assesses
can access computer and
system vulnerabilities, and identifies
what actions they can take
intrusions and suspicious behavior
Audit trail records access
attempts
11. Security and network usage policy
› Document, agreement, or contract that
Defines acceptable and unacceptable uses
of computer and network resources
› Typically warn against using the network for
illegal activities
› Often called the “IT Code of Conduct”
11
12. According to Symantec:
SPAM accounts for 72% of all email messages
Most from US….followed by Russia then Turkey.
2003 Can-Spam Act in US
May, 2008: $230 million in its suit in favor of
MySpace against the “Spam King”, Sanford
Wallace
12
13. Methods of Attack
› Key-logging
› packet-sniffing
› Port-scanning
› Social engineering
› Dumpster diving
13
14. Virus
› Program that attaches itself to a file
› Spreads to other files, and delivers a destructive action
called a payload
Trojan horses
› Appear to be harmless programs
› When they run, install programs on the computer that can
be harmful
Worm
› Acts as a free agent, replicating itself numerous times in an
effort to overwhelm systems
Microsoft Video
14
15. Worm copies
Virus is a Trojan horse hides Payload
itself repeatedly,
potentially within (destructive
using up
damaging or looks like event) that is
resources
computer legitimate delivered when
and possibly
program program until you open file, run
shutting down
triggered infected
computer or
program, or boot
network
computer with
Does not
Can spread infected disk
replicate
and in disk drive
itself on
damage
other
files
computers
Mobile Viruses
17. Records
information
about program such
as file size and
creation
Uses
date Attempts
information
to remove
to detect if
any detected
virus tampers
virus
with file
Quarantines
infected
files that it
cannot
Keeps file
in separate remove
area of hard disk
18. Never open an
e-mail attachment
Set the macro security
Install an antivirus
unless you are
in programs so you
program on all of
expecting it and
can enable or disable
your computers
it is from a
macros
trusted source
If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately
19. Spyware
› Software installed on a computer without user’s
knowledge
Zombie computer
› Carries out actions (often malicious) under the
remote control of a hacker
Antispyware
› Software that searches a computer for spyware
and other software that may violate a user’s
privacy
The latest from spywareguide.com
19
21. •Runs consistently slower than normal
•Stops responding or locks up often
•Crashes and restarts every few minutes
•Restarts on its own and then fails to run
normally
•Applications don't work properly
•Disks or disk drives are inaccessible
•Printing doesn't work correctly
•You see unusual error messages
•You see distorted menus and dialog boxes
22. 59 million attempts from North America alone
during 24 hours of monitoring
(Consumer Reports, 9/06)
Highest percentage (1/3) from US
(Symantec, 3/07)
Temple thwarts about 2000 attacks a day
Security breach example:
› April, 2006: University Texas – 197,000 social security
numbers breached
PA Breach of Personal Information Notification
Act
› 34 states have these
23. Malicious programs that control your PC without
your knowledge
6 million known cases, 2nd half of 2006 (Symantec)
Turns your PC into a spam machine or a host for
phishing sites
Few years ago….Temple….server was hijacked
and attacks launched from there. Brought down
Ministry of Education’s System in Amsterdam.
Interpol was involved.
24. 2/3 of top risks in late 2006 (source: Symantec)
were to get confidential information
80% of these tracked key strokes
The Black Market (source: 3/21/07 WSJ)
› Complete ID, including name, address, birth
date, ss#, bank accounts, etc. ---- $14-$18
› Verified PayPal Account --- $50-$500
25. Security system
consisting of
hardware and/or
software that
prevents
unauthorized
network access
25
26. Program that protects personal computer and its data
from unauthorized intrusions
Monitors transmissions to and from computer
Informs you of attempted intrusion
26
29. Duplicate of file, program, or disk
Three-generation
Full backup Selective backup backup
all files in select which files preserves
computer to back up three copies of
important files
In case of system failure or corrupted files,
restore files by copying to original location
31. Discovery, collection, and analysis of evidence
found on computers and networks
Computer forensic analysts must have knowledge
of the law, technical experience, communication
skills, and willingness to learn
31
32. “Be the change you
wish to see in the
world.”
- Mahatma Ghandi
32