#companysecrets
Explore tagged Tumblr posts
Photo
Start Your CS Career with LectureArc‼
Get CS Lecture most effective & efficient way of teaching with high quality video lectures in Pendrive & other modes‼
👉 For our Video Lectures Visit https://lecturearc.in/product-category/video-lectures/
🔰 To know more visit our website now https://lecturearc.in/
0 notes
Photo
#ohhello @alaskaair #seat9F #passenger, if only we all #worked for the same #company so we could all benefit form your #veryimportant #meeting that you seem to be holding in your seat with #noregard that the seats around you #couldcareless...#HINT how about using your #insidevoice #imjustsaying #insiderinformation #companysecrets #ihaveanidea #100daysofsummer #letsadventure @fly_sfo (at Virgin America at San Francisco)
#noregard#hint#letsadventure#ohhello#insidevoice#passenger#meeting#couldcareless#insiderinformation#company#worked#companysecrets#100daysofsummer#seat9f#imjustsaying#ihaveanidea#veryimportant
0 notes
Text
Week7 Lecture reflection
Diffie Hellman Key exchange
Get the shared key by sharing the secret, not encryption.
Cyber Literacy - Vulnerabilities
terms to know:
Software Bug: A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
Vulnerability: In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system.
Exploit: Taking advantage of a vulnerability
types
memory corruption
buffer overflow
format string
Know about
the stack and the heap
how functions are called in C
Exploit:
shell code: do something that will pop up a remote shell or terminal.
C programs are self-regulatory and usually check if someone isn’t meant to be somewhere
nop sleds:In computer security,a NOP sled is a sequence of NOP (no-operation) instructions meant to "slide" the CPU's instruction execution flow to its final, desired destination whenever the program branches to a memory address anywhere on the slide.The technique sees common usage in software exploits, where it is used to direct program execution when a branch instruction target is not known precisely.
Assets:
Work out what all the things you should be protecting and their relative value to you.
Examples of assets
Team America – are we protecting against the terrorists or are protecting the innocent?
Car doorbell: Richard’s friend rigged a car door to a doorbell in their apartment, so that when the door opens, the doorbell rings.
Prioritising the car or yourself as an asset: is the car worth more than getting hurt from a criminal gang?
Coke/other companies: reputation and branding is a very big asset
Difficult to put a price into a company’s reputation
Strategies for Identifying the Assets
Regularly surveying the values of people of the involved in what you are protecting
Multiple pairs of eyes is a good asset.
Develop a sensible plan - well designed to tease this information out of them.
Humans are generally poor at regurgitating everything they know, however they are generally very good critics.
Periodically revise current list of assets
Don't set and forget. Values and assets of an organisation can drift.
Types of assets:
Tangible: easy to value
Intangible: hard to value (does not mean don’t do!)
Employee morale and security
Consumer information
Companysecrets
Availability of services
Psychological and emotional
0 notes