CIT 380: Securing Computer Systems 1
Topics CIT 380: Securing Computer Systems 2
Increasing Attack Sophistication CIT 380: Securing Computer Systems 3
More Data Breaches CIT 380: Securing Computer Systems 4
Threats: Malware CIT 380: Securing Computer Systems 5
Threats: Virtual Attacks CIT 380: Securing Computer Systems 6
Threats: Offline Impact CIT 380: Securing Computer Systems 7
Threats: Spear Phishing CIT 380: Securing Computer Systems 8
Threats: Vishing CIT 380: Securing Computer Systems 9
Underground Economy CIT 380: Securing Computer Systems 10
Hardware Security: Biometrics CIT 380: Securing Computer Systems 11
Hardware Security: TC CIT 380: Securing Computer Systems 12
Hardware Security Features CIT 380: Securing Computer Systems 13
CIT 380: Securing Computer Systems 14
TC as a way of enforcing DRM CIT 380: Securing Computer Systems 15
TC supports Remote Censorship CIT 380: Securing Computer Systems 16
Solution: Owner Override CIT 380: Securing Computer Systems 17
Software Security CIT 380: Securing Computer Systems 18
Economics of Security CIT 380: Securing Computer Systems 19
Security Incentives CIT 380: Securing Computer Systems 20
Security as Externality CIT 380: Securing Computer Systems 21
Network Externality CIT 380: Securing Computer Systems 22
CIT 380: Securing Computer Systems 23
Security and Markets: Insurance CIT 380: Securing Computer Systems 24
Security and Markets: DRM CIT 380: Securing Computer Systems 25
Economics of Privacy CIT 380: Securing Computer Systems 26
Security and Usability CIT 380: Securing Computer Systems 27
Security and Usability CIT 380: Securing Computer Systems 28
Future of Privacy: Tracking CIT 380: Securing Computer Systems 29
CIT 380: Securing Computer Systems 30
References CIT 380: Securing Computer Systems 31