Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan - - PDF document

author bill buchanan author bill buchanan author bill
SMART_READER_LITE
LIVE PREVIEW

Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan - - PDF document

Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author: Bill Buchanan Author:


slide-1
SLIDE 1

Author: Bill Buchanan Author: Bill Buchanan

slide-2
SLIDE 2

Author: Bill Buchanan Author: Bill Buchanan

slide-3
SLIDE 3

Author: Bill Buchanan Author: Bill Buchanan

slide-4
SLIDE 4

Author: Bill Buchanan Author: Bill Buchanan

slide-5
SLIDE 5

Author: Bill Buchanan Author: Bill Buchanan

slide-6
SLIDE 6

Author: Bill Buchanan Author: Bill Buchanan

slide-7
SLIDE 7

Author: Bill Buchanan Author: Bill Buchanan

Which package should you download to be able to access the tests:

1 2 3 4 5 6

22% 13% 17% 10% 25% 13%

  • 1. Packet Tracer
  • 2. Networksims.com

ProfSIMs

  • 3. WebCT Analyser
  • 4. Security+ Net
  • 5. Google Reader
  • 6. iTunes Tester
slide-8
SLIDE 8

Author: Bill Buchanan Author: Bill Buchanan

To downloads the iTunes version of the lectures, which is the search term:

1 2 3 4 5 6

17% 15% 17% 15% 20% 17%

  • 1. AdvSecurity
  • 2. Napier
  • 3. ASFN
  • 4. SoC
  • 5. AdvancedNapier
  • 6. NetForensics
slide-9
SLIDE 9

Author: Bill Buchanan Author: Bill Buchanan

Which is not a subject taught on the module:

1 2 3 4 5 6

13% 20% 12% 17% 22% 17%

  • 1. Cloud Computing
  • 2. Compliance/Auditing
  • 3. Web Infrastructures
  • 4. Threat Analysis
  • 5. Network Forensics
  • 6. Data Hiding
slide-10
SLIDE 10

Author: Bill Buchanan Author: Bill Buchanan

Participant Scores 3 Participant 25 2 Participant F3D61 2 Participant 2 2 Participant 4 2 Participant 16

slide-11
SLIDE 11

Author: Bill Buchanan Author: Bill Buchanan

slide-12
SLIDE 12

Author: Bill Buchanan Author: Bill Buchanan

slide-13
SLIDE 13

Author: Bill Buchanan Author: Bill Buchanan

slide-14
SLIDE 14

Author: Bill Buchanan Author: Bill Buchanan

slide-15
SLIDE 15

Author: Bill Buchanan Author: Bill Buchanan

slide-16
SLIDE 16

Author: Bill Buchanan Author: Bill Buchanan

Which is a man-made/political threat :

1 2 3 4

25% 25% 25% 25%

  • 1. Disgruntled employees
  • 2. Outages
  • 3. Earthquakes
  • 4. Storms
slide-17
SLIDE 17

Author: Bill Buchanan Author: Bill Buchanan

Which is a technical threat :

1 2 3 4

25% 25% 25% 25%

  • 1. Riots
  • 2. Equipment outages
  • 3. Earthquakes
  • 4. Storms
slide-18
SLIDE 18

Author: Bill Buchanan Author: Bill Buchanan

Which is a prolonged power loss:

1 2 3 4 5

20% 20% 20% 20% 20%

  • 1. Spike
  • 2. Brownout
  • 3. Sag
  • 4. Fault
  • 5. Blackout
slide-19
SLIDE 19

Author: Bill Buchanan Author: Bill Buchanan

Which is the term used for momentary high voltage:

1 2 3 4 5

20% 20% 20% 20% 20%

  • 1. Spike
  • 2. Brownout
  • 3. Sag
  • 4. Fault
  • 5. Blackout
slide-20
SLIDE 20

Author: Bill Buchanan Author: Bill Buchanan

In a multi-story building, where is likely to be the best place to locate the data centre:

1 2 3 4

25% 25% 25% 25%

  • 1. In the basement
  • 2. On the top floor
  • 3. On the middle floor
  • 4. On the outside of the

building

slide-21
SLIDE 21

Author: Bill Buchanan Author: Bill Buchanan

slide-22
SLIDE 22

Author: Bill Buchanan Author: Bill Buchanan

slide-23
SLIDE 23

Author: Bill Buchanan Author: Bill Buchanan

slide-24
SLIDE 24

Author: Bill Buchanan Author: Bill Buchanan

slide-25
SLIDE 25

Author: Bill Buchanan Author: Bill Buchanan

slide-26
SLIDE 26

Author: Bill Buchanan Author: Bill Buchanan

slide-27
SLIDE 27

Author: Bill Buchanan Author: Bill Buchanan

slide-28
SLIDE 28

Author: Bill Buchanan Author: Bill Buchanan

slide-29
SLIDE 29

Author: Bill Buchanan Author: Bill Buchanan

slide-30
SLIDE 30

Author: Bill Buchanan Author: Bill Buchanan

slide-31
SLIDE 31

Author: Bill Buchanan Author: Bill Buchanan

slide-32
SLIDE 32

Author: Bill Buchanan Author: Bill Buchanan

slide-33
SLIDE 33

Author: Bill Buchanan Author: Bill Buchanan

slide-34
SLIDE 34

Author: Bill Buchanan Author: Bill Buchanan

slide-35
SLIDE 35

Author: Bill Buchanan Author: Bill Buchanan

slide-36
SLIDE 36

Author: Bill Buchanan Author: Bill Buchanan

slide-37
SLIDE 37

Author: Bill Buchanan Author: Bill Buchanan

slide-38
SLIDE 38

Author: Bill Buchanan Author: Bill Buchanan

slide-39
SLIDE 39

Author: Bill Buchanan Author: Bill Buchanan

slide-40
SLIDE 40

Author: Bill Buchanan Author: Bill Buchanan

Which infects computer systems with the intentionally to copy themselves onto other systems

1 2 3 4 5 6

20% 5% 13% 18% 18% 25%

  • 1. Viruses
  • 2. Trojans
  • 3. Logic bombs
  • 4. Worms
  • 5. Bots
  • 6. Rootkits
slide-41
SLIDE 41

Author: Bill Buchanan Author: Bill Buchanan

Which pretends to be a useful application, but has malicious intent

  • 1. Viruses
  • 2. Trojans
  • 3. Logic bombs
  • 4. Worms
  • 5. Bots
  • 6. Rootkits
slide-42
SLIDE 42

Author: Bill Buchanan Author: Bill Buchanan

Participant Scores 3 Participant 2 3 Participant 4 3 Participant 25 2 Participant F3D61 2 Participant 14

slide-43
SLIDE 43

Author: Bill Buchanan Author: Bill Buchanan

slide-44
SLIDE 44

Author: Bill Buchanan Author: Bill Buchanan

slide-45
SLIDE 45

Author: Bill Buchanan Author: Bill Buchanan

slide-46
SLIDE 46

Author: Bill Buchanan Author: Bill Buchanan

slide-47
SLIDE 47

Author: Bill Buchanan Author: Bill Buchanan

slide-48
SLIDE 48

Author: Bill Buchanan Author: Bill Buchanan

slide-49
SLIDE 49

Author: Bill Buchanan Author: Bill Buchanan

slide-50
SLIDE 50

Author: Bill Buchanan Author: Bill Buchanan

slide-51
SLIDE 51

Author: Bill Buchanan Author: Bill Buchanan

slide-52
SLIDE 52

Author: Bill Buchanan Author: Bill Buchanan

slide-53
SLIDE 53

Author: Bill Buchanan Author: Bill Buchanan

slide-54
SLIDE 54

Author: Bill Buchanan Author: Bill Buchanan

slide-55
SLIDE 55

Author: Bill Buchanan Author: Bill Buchanan

slide-56
SLIDE 56

Author: Bill Buchanan Author: Bill Buchanan