help_outline Skip to main content

HomeEvents9:00am: Cyber Security: Software

Events - Event View

This is the "Event Detail" view, showing all available information for this event. If the event has passed, click the "Event Report" button to read a report and view photos that were uploaded.

9:00am: Cyber Security: Software

When:
Wednesday, January 15, 2020, 9:00 AM until 10:30 AM
Where:
Silicon Room (Computer Club Classroom)
See Map
SaddleBrooke, AZ  
Additional Info:
Event Contact(s):
Ken Knapp
858.231.3799 (p)
Category:
PC ONLY
Registration is required
Payment In Full In Advance Only
Capacity:
12
Available Slots:
8
No Fee

Cyber Security and Technology                               Software Security                                          November  2019

 

1. Operating System Security

               A. Default security– the security software that comes out-of-the-box

               B. Configured security – after you install software, the changes you can make to customize it for your

     environment/the way you use the system. A/V, graphics editing, games.

 

2. What’s the difference between Access and Authorization?

               A. Access – you’re allowed to logon to a system

               B. Authorization – you’re allowed to perform a specific task(s), use a specific application

               C. Access a specific location in an application, like a database. (Oracle, SQL, SAP)

 

3. Application Security – 2 ways it can be coded/implemented

               A. Security is written/coded in to the application

               B. The application uses the operating system security

               C. What’s a database?

 

4. What’s the difference between an Upgrade, an Update and a Patch?

               A. Upgrade – a new version of an application or operating system

              B. Update – a new feature or enhancement to a feature (build)

               C. Patch – a feature didn’t work correctly or a patch to fix a vulnerability; security patch.

 

5. What’s a Log? (Privacy) – A log is a record of computer activities. It can track login activities, network activity, 

                   accessing a specific application and/or part of an application.

               A. What gets logged?                     Activities

               B. Why do I need a log?                Tracking activity, troubleshooting, forensics

               C. What are they used for?          Verification, confirmation, forensics

               D. Can I delete them?                    Depends

 

6. Security Technology

               A. Micro-flip wallet card               

https://www.customusb.com/micro-flip-usb-wallet-card/

                              https://www.alphacard.com/id-cards/visual-security-on-id-cards

 

  • VeriMark Cards - tamper-resistant, easily verified. Secure, metallic foils on cards. Permanent, easy-to-identify visual counterfeit deterrent.
  • HoloMark Cards - level of security mirrors holographic foils on credit cards. Can be designed with hidden features such as nanotext, laser-viewable images, microtext and flip imaging.

 

WHAT IS A BIOMETRIC LICENSE AND HOW DO THEY WORK?

A Biometric license employs biometric technology for identification. This includes fingerprinting and may include iris and retinal scanning in the future. A person’s information would be stored in a national database that would allow American and Canadian governments to match biometric information.

 

ARE THEY ACTUALLY SAFER THAN REGULAR LICENSES?

Biometric Licenses have the potential to be incredibly safe. They can prevent identity theft and make it harder for someone to forge or copy. In addition, if there’s a crash or emergency, it could enable emergency medical technicians to access life saving medical information. A biometric license that includes smart card technology could combine the victim’s health data with the driver’s license. Could replace passports.

 

Don’t get too carried away with “Apps”.