Sec23-01-Updated.pdf

Course Overview

Part 1: Web security

Part 2: Software security

Part 3: Mobile security

Trusting Trust

Ken Thompson's article on trusting trust

Sample Attacks

  1. IP address and bandwidth stealing

Goal: Look like a random Internet user

  1. Steal user credentials and inject ads
  2. Ransomware
  1. Spread to isolated systems