From 794b3ea85628ed0d970655f1242e5723b9b196b4 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Wed, 27 Jul 2022 18:44:35 +1200 Subject: [PATCH] vault backup: 2022-07-27 18:44:35 --- content/notes/02-combinatorial-logic.md | 9 ++------- .../notes/03-threats-social-engineering-and-failures.md | 9 ++++----- content/notes/boolean-equations.md | 2 +- 3 files changed, 7 insertions(+), 13 deletions(-) diff --git a/content/notes/02-combinatorial-logic.md b/content/notes/02-combinatorial-logic.md index 5c218e817..28049bae5 100644 --- a/content/notes/02-combinatorial-logic.md +++ b/content/notes/02-combinatorial-logic.md @@ -4,8 +4,8 @@ aliases: tags: - cosc204 - lecture -sr-due: 2022-07-27 -sr-interval: 8 +sr-due: 2022-08-16 +sr-interval: 20 sr-ease: 250 --- @@ -33,11 +33,6 @@ sr-ease: 250 - - - - - # Circuit basics: - current flows + to - - input to a unit (e.g., LED) is the + end diff --git a/content/notes/03-threats-social-engineering-and-failures.md b/content/notes/03-threats-social-engineering-and-failures.md index d9e1d2dda..8298e7a17 100644 --- a/content/notes/03-threats-social-engineering-and-failures.md +++ b/content/notes/03-threats-social-engineering-and-failures.md @@ -10,10 +10,10 @@ sr-ease: 250 --- # News -- kiwis urged to get new passwords by government cybersecurity agency (big password energy) +- kiwis urged to get new passwords by government cybersecurity agency ("big password energy") - ukraine cyber agency reports cyber attack surge - plymouth households hit by clarion housing cyber attack -- facebook "unintentionally uploaded" 1.5 million peoles email contacts without their consent +- facebook "unintentionally uploaded" 1.5 million peoples email contacts without their consent - threat maps: https://threatmap.checkpoint.com/ThreatPortal/livemap.html # Threats @@ -116,9 +116,9 @@ security is a never ending arms race. Security is improving but so are the numbe - using social skills to convince people to reveal access credentials or other valuable information to an attacker - used for a broad range of malicious activities through human interactions -![kevin mitkick quote](https://i.imgur.com/Q7ChU37.png) +![kevin mitnick quote](https://i.imgur.com/Q7ChU37.png) -Developing trust if a powerful technique in social engineering +Developing trust is a powerful technique in social engineering - people are naturally helpful and trusting - ask during seemingly innocent conversations - slowly ask for increasingly imprtant information @@ -139,7 +139,6 @@ information overload technique - providing a lot of information - providing arguments from an unexpected angle, whicih forces the victim to analyse the situation from a new perspective which requires additional mental processing - Reciprocation - technique that exploits our tendency to return a favour - even if first favour was not requested diff --git a/content/notes/boolean-equations.md b/content/notes/boolean-equations.md index 44149b3be..57714ef8b 100644 --- a/content/notes/boolean-equations.md +++ b/content/notes/boolean-equations.md @@ -11,7 +11,7 @@ Often used to describe/define [combinatorial-logic-circuit](notes/combinatorial- Precedence - NOT is unary, so it has the highest precedence - AND is mulitply, so it comes next -- OR is like plusl, to it comes last +- OR is like plus, to it comes last ![Precedence table|200](https://i.imgur.com/jPlrVwW.png)