mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-24 21:34:06 -06:00
vault backup: 2022-07-27 18:44:35
This commit is contained in:
parent
3094659e6d
commit
794b3ea856
@ -4,8 +4,8 @@ aliases:
|
||||
tags:
|
||||
- cosc204
|
||||
- lecture
|
||||
sr-due: 2022-07-27
|
||||
sr-interval: 8
|
||||
sr-due: 2022-08-16
|
||||
sr-interval: 20
|
||||
sr-ease: 250
|
||||
---
|
||||
|
||||
@ -33,11 +33,6 @@ sr-ease: 250
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
# Circuit basics:
|
||||
- current flows + to -
|
||||
- input to a unit (e.g., LED) is the + end
|
||||
|
||||
@ -10,10 +10,10 @@ sr-ease: 250
|
||||
---
|
||||
|
||||
# News
|
||||
- kiwis urged to get new passwords by government cybersecurity agency (big password energy)
|
||||
- kiwis urged to get new passwords by government cybersecurity agency ("big password energy")
|
||||
- ukraine cyber agency reports cyber attack surge
|
||||
- plymouth households hit by clarion housing cyber attack
|
||||
- facebook "unintentionally uploaded" 1.5 million peoles email contacts without their consent
|
||||
- facebook "unintentionally uploaded" 1.5 million peoples email contacts without their consent
|
||||
- threat maps: https://threatmap.checkpoint.com/ThreatPortal/livemap.html
|
||||
|
||||
# Threats
|
||||
@ -116,9 +116,9 @@ security is a never ending arms race. Security is improving but so are the numbe
|
||||
- using social skills to convince people to reveal access credentials or other valuable information to an attacker
|
||||
- used for a broad range of malicious activities through human interactions
|
||||
|
||||

|
||||

|
||||
|
||||
Developing trust if a powerful technique in social engineering
|
||||
Developing trust is a powerful technique in social engineering
|
||||
- people are naturally helpful and trusting
|
||||
- ask during seemingly innocent conversations
|
||||
- slowly ask for increasingly imprtant information
|
||||
@ -139,7 +139,6 @@ information overload technique
|
||||
- providing a lot of information
|
||||
- providing arguments from an unexpected angle, whicih forces the victim to analyse the situation from a new perspective which requires additional mental processing
|
||||
|
||||
|
||||
Reciprocation
|
||||
- technique that exploits our tendency to return a favour
|
||||
- even if first favour was not requested
|
||||
|
||||
@ -11,7 +11,7 @@ Often used to describe/define [combinatorial-logic-circuit](notes/combinatorial-
|
||||
Precedence
|
||||
- NOT is unary, so it has the highest precedence
|
||||
- AND is mulitply, so it comes next
|
||||
- OR is like plusl, to it comes last
|
||||
- OR is like plus, to it comes last
|
||||
|
||||

|
||||
|
||||
|
||||
Loading…
Reference in New Issue
Block a user