Security

The protection resistance is matter of time, money or opportunities. Anything is vulnerable directly or indirectly.

on ne peut chiffrer ou déchiffrer une donnée, l'inscrire ou la supprimer d'une mémoire sans apporter et déposer une trace sur l'ordinateur, sans modifier et prendre quelque chose qui s'y trouvait auparavant.

— Zythom: Le principe de l'échange de Locard

It's cheaper to get hacked than build strong IT defenses

— Sad reality: It's cheaper to get hacked than build strong IT defenses • The Register

areoplanes include strict systems to separate the cabin from the cockpit [...] concept of "security domains"

— When fictional worlds are an accurate representations of IoT security – LearntEmail

We had cryptographic potatoes for dinner. They were salted and hashed.

— Andromeda Yelton

Don't trust anyone

Resources

Web security

Data access and integrity

See Data access and integrity

Malware

Types: ransomware, etc.

SMTP stands for Simple Malware Transport Protocol.

— Kevin Beaumont

DDoS

Could be a protest, a capabilities test, etc.

10MB + 10x CC to the same email = 100MB into the inbox while you sent only 10MB

Subscribe to more than 1000 mailing-list will flood your mailbox

SPAM and Phishing

A targeted fishing after a smartphone has been stolen, to get unlocked the protection This is what Apple should tell you when you lose your iPhone

Report

Return-Path: <user@sender.com>
Delivered-To: user@receiver.com
Received: ...
Received: ...
Received: ...
Received: from [AA.BB.CC.DD] (port=54579 helo=blah.com)
	by emailrelay.com
	(envelope-from <user@sender.com>)
From: Sender <user@sender.com>
To: "Receiver" <user@receiver.com>
Subject: SPAM

whois AA.BB.CC.DD, search for OrgAbuseEmail to report an abuse or use the address abuse@AA.BB.CC.DD

Wi-Fi

Harassment

Aka spontaneous events, flash mob, strike, protest, sit-in (sit-in against a business , DoS IRL), SPAM, unsolicited, etc.

Could handle the mass of people, crowd overtake

Issues: health, order, safety, etc.

See DDoS See Usurpation & social engineering

Sabotage

black hat trolling, social sabotage, guerilla

Backup

The 3-2-1 rule can aid in the backup process. It states that there should be at least 3 copies of the data, stored on 2 different types of storage media, and one copy should be kept offsite, in a remote location

— Backup - Wikipedia

Last updated