Skip to main content

Logo

CIS 75 - Principles of Computer Security (Shared screen with speaker view)
Ivers Spivey
34:57
area of containment
ciaran farley
34:59
to seperate vlans
Sam Perez
35:00
if one goes down you still have another...?
Joseph Calcagno
35:00
DMZ?
Edgar Austodillo
35:01
To create different zones of network security
Tony Farrell
35:02
you can create a dmz
Jose Garcia
35:03
to prevent fires
garrett gordon
35:04
granular cvontrol + extra security
Sam Strelitz
35:06
To split the public access servers from the private network, and to prevent scanning
Alejandro Jara
35:07
more protection
Kevin Cameron
35:08
Lets you set up different access rules for different parts of the network.
kyle b
35:10
so you can create a DMZ
Jose Garcia
35:20
more is more
ciaran farley
36:48
keep your engine seprate from your cabin
Jose Garcia
36:49
windows firewall can detect traffic that doesn't get to wan router
Jose Garcia
37:08
auto joke
garrett gordon
37:11
*if your firewall and router are one unit you can use BGP
Jose Garcia
37:12
I got it
garrett gordon
37:15
and make it redundant
Jose Garcia
38:07
to balance thruput
garrett gordon
38:22
that would be a load balancer
kyle b
38:45
LMAO
Kevin Cameron
39:21
You're welcome.
ciaran farley
40:24
#
ciaran farley
40:37
#poundsign
Sam Perez
44:06
this is exactly how cryptocurrency is mined
garrett gordon
44:56
This is related to how crytpto is mined, but that is alot more complicated than generating a SHA256 hash
garrett gordon
45:37
proof of work
garrett gordon
45:51
*mining monero as we speak
Kevin Cameron
45:53
Also requires a lot of electricity.
ciaran farley
45:54
quick question about the project, the default export type for openvas is csv and i couldn't figure out how to open the csv
garrett gordon
46:31
**if you go to my website you are generating hashes for me
Kevin Cameron
54:32
Accuracy
Sam Strelitz
54:33
Authenticity?
Edgar Austodillo
54:34
authenticity
Ivers Spivey
54:42
authenticity
kyle b
54:54
confidentiality
Sam Strelitz
54:57
Integrity?
Kevin Cameron
55:29
What about accuracy?
ciaran farley
56:33
i asked a question about the project earlier and it got lost in the mess of messages'
garrett gordon
01:01:48
tcp header
ciaran farley
01:07:05
what if the passwords are salted in the database ?
ciaran farley
01:07:34
and how do you salt with the md5sum program
kyle b
01:10:27
amybe it updates every minute
Joseph Calcagno
01:16:06
so it adds your wifi name asa a salt?
Joseph Calcagno
01:17:45
cant you also hide the name of your wifi
kyle b
01:19:30
mac filtering is great for wifi, make your couch surfer try to recite a mac address
kyle b
01:22:27
Does that etymology of cryptograph stem from how rich people used to leave doded messages on thier tombs?
kyle b
01:22:51
:)
ciaran farley
01:28:49
what exactly IS the nuclear football ? is it just a piece of paper with a number on it or what ?
Joseph Calcagno
01:31:21
how do they get the key
Joseph Calcagno
01:32:07
mhmm
ciaran farley
01:36:04
facebook lets you upload pulic keys to your profile
ciaran farley
01:36:11
its a field
garrett gordon
01:36:20
facebook supports PGP email
garrett gordon
01:39:55
adobe recently leaked their private key
kyle b
01:39:57
*applause*
Jose Garcia
01:40:29
so they use that to exchange symetrical keys?
Kevin Cameron
01:41:56
Confidentiality
Sam Strelitz
01:41:57
confidentiality?
ciaran farley
01:42:00
confidentiality
ciaran farley
01:43:10
authenticitiy
ciaran farley
01:43:40
"teh digital version of a wax seal"
Jose Garcia
01:45:23
and that's how cheaters get away with affairs
Kevin Cameron
01:45:42
The smart ones, at least.
Ryan Mock
01:45:49
yes
garrett gordon
01:46:08
whatsapp is not e2e, i saw the end users IP on my webserver
garrett gordon
01:46:23
with the whatsapp useragent
garrett gordon
01:47:26
well, whatsapp is not a proper implmentation of e2e i should say
ciaran farley
01:47:30
how do you tell a web browser that a file your linking to is to be downloaded and not displayed ?
ciaran farley
01:48:34
can your private key be a physical device ?
Jose Garcia
01:52:51
I always thought public key were more secure which is why it took longer.
Jose Garcia
01:56:54
would she re encprypt with her private key before sending aes key?
Jose Garcia
01:57:10
for signing purposees
Jose Garcia
01:59:14
got it
ciaran farley
01:59:41
hangouts ?
garrett gordon
01:59:47
It is end to end encrypted
garrett gordon
02:00:09
But it connects the user to my webserver when they post a link to my site
ciaran farley
02:01:07
should you encrypt your database of keys ?
kyle b
02:02:31
great lecture!
Ryan Mock
02:02:36
thanks mike
Jose Garcia
02:03:06
it was tetris-tastic
ciaran farley
02:08:07
gerret, hose, and mike are the only people with webcams lol
ciaran farley
02:08:24
frick Jose
ciaran farley
02:08:27
typo
Kevin Cameron
02:09:42
Hey next class: make that part of your report!
Kevin Cameron
02:11:13
Happy thanksgiving!