Information Communication Technology – WikiNote
Table of Contents
- Several first computer viruses
- A principle for network security
- Cybersecurity: Threats, Challenges, Opportunities Week01
- RSA conference 2020
- The "C.I.A." security concepts
- Running Linux in Windows Operating Systems
- Some Software for Electronic Crime and Digital Forensics
Several first computer viruses
- The first computer virus, called “Creeper system”, was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.
- The first computer virus for MS-DOS was “Brain” and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.
- “The Morris” was the first Computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the size of the internet. His approach used security holes in sendmail and other Unix applications as well as weak passwords, but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet.
Since then, many new viruses have been introduced and the trend is growing exponentially every year. See more details in the article of A short history of computer viruses
A principle for network security
The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.
– —The Art of War, Sun Tzu
Cybersecurity: Threats, Challenges, Opportunities Week01
RSA conference 2020
- The 5 Most Dangerous New Attack Techniques and How to Counter Them
The "C.I.A." security concepts
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for network security within an organization.
What is "C.I.A":
In an ATM system, users provide a bank card for account access and a personal identification number.
In a survey system, you feedback what your feelings in the course to the teaching committee.
Running Linux in Windows Operating Systems
Build a test environment: Can Windows and Linux be integrated? Yes, WSL 2 is released for Windows 10 and Kali Linux is available on the Microsft Store. Microsoft Windows 10 will get a full built-in Linux Kernel for WSL 2
Some Software for Electronic Crime and Digital Forensics
OSForensics® provides one of the fastest and most powerful ways to locate files on a Windows computer. OSForensics Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC.
Using advanced hashing algorithms OSForensics can create a digital identifier that can be used to identify a file. This identifier can be used both to verify a file has not been changed or to quickly find out if a file is part of a set of known files.
By looking at the contents of a file OSForensics can identify what kind of file it is and then figure out if the file has an incorrect extension. This can help locate “Dark Data” that the user has tried to conceal
By making a record of the details of the files on a hard drive a comparison can be then done at a later date to find out what has been changed. Extract text strings from binary data allowing you to find text hidden in otherwise unreadable chunks of information. Do this for both files found on the hard drive or directly from active memory of processes running on the system.
FTK® Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool such as AccessData® Forensic Toolkit® (FTK) is warranted. FTK Imager can also create perfect copies (forensic images) of computer data without making changes to the original evidence.
ProDiscover® suite of products addresses a wide range of scenarios handled by law enforcement organisations and corporate internal investigations. ProDiscover provides a rich set of features and toolkits for Computer Forensics and Incident Response. The product suite is also equipped with diagnostic and evidence collection tools for corporate policy compliance investigations and electronic discovery.
See the introduction of ProDiscover below:
AccessData® Registry Viewer™ lets you view the contents of Windows® operating system registries. Unlike the Windows Registry Editor, which can only display the current computer’s registry, Registry Viewer lets you view registry files from any computer. Registry Viewer gives you access to a registry’s protected storage. The protected storage can contain passwords, usernames, and other information that is not accessible in Windows Registry Editor. Registry Viewer provides several tools for obtaining and reporting important registry information. The Full Registry view shows all the contents of a registry file, while the Common Areas view displays sections of the registry that are most likely to contain significant data. From either view, you can select keys and subkeys to add to a report.
Autopsy® is the premier end-to-end open source digital forensics platform. Built by Basis Technology with the core features you expect in commercial forensic tools, Autopsy is a fast, thorough, and efficient hard drive investigation solution that evolves with your needs.
WinHex is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security. An advanced tool for everyday and emergency use: inspect and edit all kinds of files, recover deleted files or lost data from hard drives with corrupt file systems or from digital camera cards.