vault backup: 2022-07-27 18:44:35

This commit is contained in:
Jet Hughes 2022-07-27 18:44:35 +12:00
parent 3094659e6d
commit 794b3ea856
3 changed files with 7 additions and 13 deletions

View File

@ -4,8 +4,8 @@ aliases:
tags:
- cosc204
- lecture
sr-due: 2022-07-27
sr-interval: 8
sr-due: 2022-08-16
sr-interval: 20
sr-ease: 250
---
@ -33,11 +33,6 @@ sr-ease: 250
# Circuit basics:
- current flows + to -
- input to a unit (e.g., LED) is the + end

View File

@ -10,10 +10,10 @@ sr-ease: 250
---
# News
- kiwis urged to get new passwords by government cybersecurity agency (big password energy)
- kiwis urged to get new passwords by government cybersecurity agency ("big password energy")
- ukraine cyber agency reports cyber attack surge
- plymouth households hit by clarion housing cyber attack
- facebook "unintentionally uploaded" 1.5 million peoles email contacts without their consent
- facebook "unintentionally uploaded" 1.5 million peoples email contacts without their consent
- threat maps: https://threatmap.checkpoint.com/ThreatPortal/livemap.html
# Threats
@ -116,9 +116,9 @@ security is a never ending arms race. Security is improving but so are the numbe
- using social skills to convince people to reveal access credentials or other valuable information to an attacker
- used for a broad range of malicious activities through human interactions
![kevin mitkick quote](https://i.imgur.com/Q7ChU37.png)
![kevin mitnick quote](https://i.imgur.com/Q7ChU37.png)
Developing trust if a powerful technique in social engineering
Developing trust is a powerful technique in social engineering
- people are naturally helpful and trusting
- ask during seemingly innocent conversations
- slowly ask for increasingly imprtant information
@ -139,7 +139,6 @@ information overload technique
- providing a lot of information
- providing arguments from an unexpected angle, whicih forces the victim to analyse the situation from a new perspective which requires additional mental processing
Reciprocation
- technique that exploits our tendency to return a favour
- even if first favour was not requested

View File

@ -11,7 +11,7 @@ Often used to describe/define [combinatorial-logic-circuit](notes/combinatorial-
Precedence
- NOT is unary, so it has the highest precedence
- AND is mulitply, so it comes next
- OR is like plusl, to it comes last
- OR is like plus, to it comes last
![Precedence table|200](https://i.imgur.com/jPlrVwW.png)