mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-26 14:24:05 -06:00
vault backup: 2022-07-27 18:44:35
This commit is contained in:
parent
3094659e6d
commit
794b3ea856
@ -4,8 +4,8 @@ aliases:
|
|||||||
tags:
|
tags:
|
||||||
- cosc204
|
- cosc204
|
||||||
- lecture
|
- lecture
|
||||||
sr-due: 2022-07-27
|
sr-due: 2022-08-16
|
||||||
sr-interval: 8
|
sr-interval: 20
|
||||||
sr-ease: 250
|
sr-ease: 250
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -33,11 +33,6 @@ sr-ease: 250
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# Circuit basics:
|
# Circuit basics:
|
||||||
- current flows + to -
|
- current flows + to -
|
||||||
- input to a unit (e.g., LED) is the + end
|
- input to a unit (e.g., LED) is the + end
|
||||||
|
|||||||
@ -10,10 +10,10 @@ sr-ease: 250
|
|||||||
---
|
---
|
||||||
|
|
||||||
# News
|
# News
|
||||||
- kiwis urged to get new passwords by government cybersecurity agency (big password energy)
|
- kiwis urged to get new passwords by government cybersecurity agency ("big password energy")
|
||||||
- ukraine cyber agency reports cyber attack surge
|
- ukraine cyber agency reports cyber attack surge
|
||||||
- plymouth households hit by clarion housing cyber attack
|
- plymouth households hit by clarion housing cyber attack
|
||||||
- facebook "unintentionally uploaded" 1.5 million peoles email contacts without their consent
|
- facebook "unintentionally uploaded" 1.5 million peoples email contacts without their consent
|
||||||
- threat maps: https://threatmap.checkpoint.com/ThreatPortal/livemap.html
|
- threat maps: https://threatmap.checkpoint.com/ThreatPortal/livemap.html
|
||||||
|
|
||||||
# Threats
|
# Threats
|
||||||
@ -116,9 +116,9 @@ security is a never ending arms race. Security is improving but so are the numbe
|
|||||||
- using social skills to convince people to reveal access credentials or other valuable information to an attacker
|
- using social skills to convince people to reveal access credentials or other valuable information to an attacker
|
||||||
- used for a broad range of malicious activities through human interactions
|
- used for a broad range of malicious activities through human interactions
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Developing trust if a powerful technique in social engineering
|
Developing trust is a powerful technique in social engineering
|
||||||
- people are naturally helpful and trusting
|
- people are naturally helpful and trusting
|
||||||
- ask during seemingly innocent conversations
|
- ask during seemingly innocent conversations
|
||||||
- slowly ask for increasingly imprtant information
|
- slowly ask for increasingly imprtant information
|
||||||
@ -139,7 +139,6 @@ information overload technique
|
|||||||
- providing a lot of information
|
- providing a lot of information
|
||||||
- providing arguments from an unexpected angle, whicih forces the victim to analyse the situation from a new perspective which requires additional mental processing
|
- providing arguments from an unexpected angle, whicih forces the victim to analyse the situation from a new perspective which requires additional mental processing
|
||||||
|
|
||||||
|
|
||||||
Reciprocation
|
Reciprocation
|
||||||
- technique that exploits our tendency to return a favour
|
- technique that exploits our tendency to return a favour
|
||||||
- even if first favour was not requested
|
- even if first favour was not requested
|
||||||
|
|||||||
@ -11,7 +11,7 @@ Often used to describe/define [combinatorial-logic-circuit](notes/combinatorial-
|
|||||||
Precedence
|
Precedence
|
||||||
- NOT is unary, so it has the highest precedence
|
- NOT is unary, so it has the highest precedence
|
||||||
- AND is mulitply, so it comes next
|
- AND is mulitply, so it comes next
|
||||||
- OR is like plusl, to it comes last
|
- OR is like plus, to it comes last
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user