Note 12 for
XML
Watch & Read:
Richard Clark & I agree on CyberSecurity
XML Security Working Group
XML Security Presentation
Key Concepts
- Digital Certificates
- Encryption
- Canonicalization
Existing Tools/Technologies
Hold your data in encrypted storage!
Gaps in the Cyber Law and NPR's Cyber Insecurity:
US Government Cyber Crime info
Leaking of Sensitive Information (Wikileaks)
Biometric methods of confirming identity
Computer Security, and FBI Cyber Crimes
The Best computer security you can have is common sense!
Protect your password (don't give it to anyone), use a firewall on your network,
update your Computers's Operating System with the latest patches
and use virus protection plus update your software regularly!
Review the following:
Encryption Methods: Cryptography, Public Key Encryption, PGP
Report attacks and check for the latest attempts on computer systems
CERTŪ Coordination Center Carnegie Mellon University's Computer Emergency Response Team
CSRC Computer Security Resource Center
Forester Research Research into markets and Cyber-trends (Crime included)
Internet Hoaxes cause problems for business. Semantic has a page dedicated to hoaxes as does about.com
Have someone else in the class review your website using our notes on Good Web design
Terms you need to know:
Encryption Methods:
Biometrics: Using characteristics of your body (voice, finger print, DNA, Eye) for authentication.
Homework:
Reminder: You will need to post an article about computers, web, Internet security or e-commerce every week!!!
Final Step:
Review in your mind everything we covered in class and remember to cover it again before you go to bed so your mind to process this information while you sleep.