Talk by Professor Hankin Imperial College London. Computer science lecturer since 1984 recently worked on cyber regulation.
BSc city university
PhD Westfield university now defunct.
Work: Game theory and data analytics. Twitter traffic related to disease.
- Notes by William Gaskell
Started in computing in 1971. Has a picture with some BBC computers working at ITN on security when the internet was first developed in 1974. On feed from Reuters and other agencies. He would type election results in to news graphics generator.
Account hijacking such as taking someone's Facebook account is typical attack related to clicking on dodgy link or visit dodgy page.
Buffer overflow 40 year old known vulnerability that was exploited recently. Heartbleed vulnerability. Delay in applying patching software led to the vulnerability being so widely exploited.
One point of concern is sticking someone else's USB stick, a known way malware can be introduced.
Companies can be fined 20m euros or 4% of global revenue for negligence of data protection responsibility.
Get Safe Online Web resource with good advice.
*Password protect my own data - BitLocker for SSD storage device. - Bitlocker Encryption on Windows 10 stopped the slave drive being used to repair Windows after a BIOS setting change from a backup image I had made, so I was able to head back to the BIOS and correct the setting without losing my install.
Internet of things. Now attacks on car brakes on WiFi. Attacks disrupting our daily lives.
Industrial Control System
Every component is vulnerable now as it has a microprocessor.
Two stage attack delivery -> online attack, development in infected network then attack.
Talk at the Guild 15th Feb 2018
Lisa Forte
Susan Thompson
Paul Mutton from Netcraft
"No one uses Opera unless they are checking for vulnerabilities not found in any other browsers." - Usually uses Firefox for testing.
Crystal disk mark
Comments
Post a Comment