You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We also may reject your answer if it's flagged too many times as spam or if it doesn't contain deep enough discussion. Also, we may reject your peer reviews if you haven't put genuine effort into them.</p>
80
80
81
81
<p>If you want ECTS credits you will need to register here AFTER completing the course:
82
-
<b>To be announced in 2 weeks.</b> Join the mailing list for updates!
82
+
<b>To be announced after the course.</b> Join the mailing list for updates!
<h1>What is Cyber Security and Why Should We Care About it?</h1>
@@ -178,7 +178,7 @@ <h1>Vulnerabilities are hard to find</h1>
178
178
179
179
<p>Attacks can result in much mayhem and harm with significant monetary losses, but the business impact of a security breach can be difficult to tell. This is an area where it is hard to reach definitive and representative figures or findings. At least one study, however, from <ahref="https://www.oxfordeconomics.com/my-oxford/projects/276032" target="_blank" onclick="trackOutbound('https://www.oxfordeconomics.com/my-oxford/projects/276032'); return false;">Oxford Economics</a>, provides a set of findings based on surveys and case studies. Those findings show that cyber attacks do indeed result in major business impact on victims.</p>
<p>The job of a vulnerability researcher is to come up with recommendations for minimizing the risk to an organization. The tasks of protecting enterprise systems and data include establishing policies, practices and tools that lower the risk of illicit behaviour. The technical security assessments performed by vulnerability researchers include the identification of vulnerabilities, misconfigurations, and weaknesses.</p>
184
184
@@ -191,15 +191,15 @@ <h1>TED - a source of infinite goodness</h1>
191
191
<p>Watch James Lyne's talk <ahref="https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it?language=en" target="_blank" onclick="trackOutbound('https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it?language=en'); return false;">"Everyday cybercrime -- and what you can do about it"</a> on TEDTv.</p>
<h2>Media Reports only the Tip of the Iceberg</h2>
205
205
@@ -208,15 +208,15 @@ <h2>Media Reports only the Tip of the Iceberg</h2>
208
208
<p>Although the media is beginning to take breach news seriously, and studies such as the <ahref="http://www.crimesurvey.co.uk/" target="_blank">Crime Survey of England and Wales</a> from the Office of National Statistics show that the frequency of incidents is increasing, it is still commonly believed that cyber crime is an underreported area of illegality.</p>
<p>The above conveys a bleak picture of the current state of things. At the same time, however, governments, organizations, corporations and institutions are funnelling more and more money, research and effort into improving the situation.</p>
222
222
@@ -266,7 +266,7 @@ <h2>Responsibilities and Liabilities</h2>
266
266
267
267
<p>The GDPR provides the first economical grounds for data protection: just as environmental regulations have internalized the cost of environmental damage to production, we may see the same happening with data protection. Insurance companies have also noticed the impending GDPR and have introduced various types of cyber security insurance which would cover some costs caused by a breach (for example a loss of profit).</p>
<p>However, the law is for the law abiding; for a criminal it is just a deterrent. The Internet provides anonymity and distances the attacker from the victim, making it easier to step into the world of crime via the Internet. The commission of crimes via the Internet is commonly known as <i>hacking</i>. (When discussing hacking we do have to mention <i>ethical hacking</i>. An ethical hacker, like his criminal counterpart, is an expert who tries to penetrate a computer system, but the former does it with permission from the system owner in order to reveal security vulnerabilities that malicious actors could potentially exploit.)</p>
272
272
@@ -306,11 +306,11 @@ <h2>Read and reflect</h2>
306
306
Margo Seltzer, Diomidis Spinellis, Izar Tarandach, and Jacob West, AVOIDING THE TOP 10 SOFTWARE SECURITY DESIGN FLAWS <ahref="https://www.computer.org/cms/CYBSI/docs/Top-10-Flaws.pdf" target="_blank" onclick="trackOutbound('https://www.computer.org/cms/CYBSI/docs/Top-10-Flaws.pdf'); return false;">https://www.computer.org/cms/CYBSI/docs/Top-10-Flaws.pdf</a></li>
0 commit comments