Note 12 for XML

Watch & Read:

Richard Clark & I agree on CyberSecurity

XML Security Working Group

XML Security Presentation

Key Concepts

Existing Tools/Technologies

Hold your data in encrypted storage!

Gaps in the Cyber Law and NPR's Cyber Insecurity:

US Government Cyber Crime info

Leaking of Sensitive Information (Wikileaks)

Biometric methods of confirming identity

Computer Security, and FBI Cyber Crimes

The Best computer security you can have is common sense!

Protect your password (don't give it to anyone), use a firewall on your network,
update
your Computers's Operating System with the latest patches
and use virus protection plus update your software regularly!

 

Review the following:

Encryption Methods: Cryptography, Public Key Encryption, PGP

Report attacks and check for the latest attempts on computer systems

CERTŪ Coordination Center Carnegie Mellon University's Computer Emergency Response Team

CSRC Computer Security Resource Center

Forester Research Research into markets and Cyber-trends (Crime included)

Internet Hoaxes cause problems for business. Semantic has a page dedicated to hoaxes as does about.com

Have someone else in the class review your website using our notes on Good Web design

Terms you need to know:

Encryption Methods:

Cryptograhy

Public Key Encryption

PGP

Biometrics: Using characteristics of your body (voice, finger print, DNA, Eye) for authentication.

Phishing and Pharming is a popular security risk.

Homework:

Reminder: You will need to post an article about computers, web, Internet security or e-commerce every week!!!

Final Step:

Review in your mind everything we covered in class and remember to cover it again before you go to bed so your mind to process this information while you sleep.