Table of Contents
Links used in lecture
26 Apr 2023
2 May 2024
17 May 2024
Access Control
Malicious software
Links used in lecture
26 Apr 2023
rootkit
https://www.kaspersky.com/resource-center/definitions/what-is-rootkit#:~:text=A%20rootkit%20is%20software%20used,control%20over%20the%20target%20device
.
https://en.wikipedia.org/wiki/Rootkit
https://soyacincau.com/2024/02/05/maxis-yoututor-r00tk1t-cyberattack/
2 May 2024
history
https://en.wikipedia.org/wiki/Computer_worm
https://en.wikipedia.org/wiki/List_of_computer_worms
https://www.eater.com/22702839/disney-anton-ego-ratatouille-restaurant-criticism
https://www.vice.com/en/article/wn7mbb/i-dont-trust-restaurant-letter-grades
17 May 2024
https://www.youtube.com/watch?v=nwPtcqcqz00
https://en.wikipedia.org/wiki/MD5
https://en.wikipedia.org/wiki/Stereoscopy
https://www.iso.org/home.html
https://riskpal.com/wp-content/uploads/2022/11/RP_Cover_What-is-a-risk-assessment-matrix-1-scaled.jpg
security policy
https://www.techtarget.com/whatis/definition/BYOD-bring-your-own-device
KVM
https://en.wikipedia.org/wiki/KVM_switch
https://www.networkhardwares.com/products/neo-flex-24-206-214-lcd-cart-24-206-214?variant=41019245232333&utm_medium=product_sync&utm_source=google&utm_content=sag_organic&utm_campaign=sag_organic&utm_source=google-ads&utm_campaign=&utm_agid=&utm_term=&creative=&device=c&placement=&gad_source=1&gclid=Cj0KCQjwxeyxBhC7ARIsAC7dS38t1khI0xzEM4k3TUBrdgmrqFmrKILGVP3MrUI7wz6vt_oZX60tpJYaAq2_EALw_wcB
Access Control
Open ID
https://openid.net/
https://developers.google.com/identity
https://en.wikipedia.org/wiki/Identity_management
https://en.wikipedia.org/wiki/List_of_password_managers
https://en.wikipedia.org/wiki/Access-control_list
https://en.wikipedia.org/wiki/Sticky_bit
https://chmod-calculator.com/
Malicious software
https://www.fortinet.com/resources/cyberglossary/recent-cyber-attacks
https://en.wikipedia.org/wiki/List_of_computer_worms
https://en.wikipedia.org/wiki/Computer_worm
https://en.wikipedia.org/wiki/Malware
https://en.wikipedia.org/wiki/Ransomware
https://en.wikipedia.org/wiki/Computer_virus
articles
https://www.researchgate.net/profile/Dr-Bhaskar-Patil/publication/274468580_Computer_Virus_Their_Problems_Major_at-tacks_in_Real_Life/links/5683652608ae1e63f1f02394/Computer-Virus-Their-Problems-Major-at-tacks-in-Real-Life.pdf
https://link.springer.com/chapter/10.1007/978-981-99-8451-0_54