Class Freeware, Open Source, and Free Software There is a difference, who knew?

Similar documents
Unix to Linux. CS 3113 Fall 2018 Dr. Christan Grant

CSC 634: Networks Programming

CS108 Software Systems: UNIX. Fall 2011

Introduction to Linux

History of Unix, Linux and the Open Source

Brief Linux Presentation. July 10th, 2006 Elan Borenstein

Ethics. Ethics. Ethics. Ethics. The issue of software ownership. The issue of software ownership. Programmers and the Hacker mentality.

Chapter 6 Network and Internet Security and Privacy

CSCI 2132 Software Development. Lecture 2: Introduction to UNIX and Unix-like Operating Systems

Introduction to Security. Computer Networks Term A15

CSE 544 Advanced Systems Security

RSA Web Threat Detection

COURSE OUTLINE. UNIX Programming 2014 Fall by Euiseong Seo

Advanced Systems Security: Putting It Together Systems

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION

CS 378 (Spring 2003) Linux Kernel Programming. Yongguang Zhang. Copyright 2003, Yongguang Zhang

Spring Modern Computer Science in a Unix Like Environment CIS c

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Welcome to ULI101! The Internet has become part of our daily lives.

Understanding the Changing Cybersecurity Problem

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

Operating System Labs. Yuanbin Wu

History And Modern Uses Of The Unix Operating System (including embedded devices and mobile phones).

Unix Linux Fundamentals And Shell Scripting

Practical Computing-II. Programming in the Linux Environment. 0. An Introduction. B.W.Gore. March 20, 2015

Lecture 01: welcome and intro what LSD and Unix have in common

Author(s): August E. Evrard, PhD. 2010

CISC 220 fall 2011, set 1: Linux basics

An Operating System History of Operating Systems. Operating Systems. Autumn CS4023

Securing Information Systems

Online Threats. This include human using them!

tech. solutions T2G Page1 ALT_01_Ch1 : Introduction to Linux ideas and history The History of Linux starts with the earlier development of UNIX.

computers to personal computers

Home Computer and Internet User Security

Network Security Fundamentals

CTS2134 Introduction to Networking. Module 08: Network Security

Operating System Labs. Yuanbin Wu

Overview of Unix / Linux operating systems

Linux for Beginners. Windows users should download putty or bitvise:

ISC2 EXAM - SSCP. Systems Security Certified Practitioner. Buy Full Product.

Free Software Alternatives to Commercial Math Software

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Systems Programming. The Unix/Linux Operating System

Unit 2 Assignment 2. Software Utilities?

CIS 90 Introduction to UNIX/Linux

Ethical Hacking and Prevention

Information Technology Enhancing Productivity and Securing Against Cyber Attacks

CS System Security Mid-Semester Review

Open Source Development

Intro to FOSS. What is FOSS?

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Basics of system administration on a Unix system

UNIX Concepts COMPSCI 386

ENEE 457: Computer Systems Security 8/27/18. Lecture 1 Introduction to Computer Systems Security

INF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015

Security Gap Analysis: Aggregrated Results

Service Provider View of Cyber Security. July 2017

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break.

Copyright 2006 Prentice-Hall. All rights reserved. 1

Free & Open Source Software: The Academic Future

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

Introduction to Linux Overview and Some History

The Challenge of Spam An Internet Society Public Policy Briefing

Elementary Computing CSC 100. M. Cheng, Computer Science

A Review Paper on Network Security Attacks and Defences

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

LECTURE/ STUDY NOTES ON C

Zimbra Collaboration Two-Factor Authentication

Saint Louis University. Intro to Linux and C. CSCI 2400/ ECE 3217: Computer Architecture. Instructors: David Ferry

Fall 2005 Joseph/Tygar/Vazirani/Wagner Final

Technology in Action

Windows 10 Pro device opportunity

EECS 470 Lab 5. Linux Shell Scripting. Friday, 1 st February, 2018

CS 153 Design of Operating Systems

Language-Based Protection

Operating Systems. I. Introduction. Eurecom

Intelligent and Secure Network

CHAPTER 8 SECURING INFORMATION SYSTEMS

Course Wiki. Today s Topics. Web Resources. Amazon EC2. Linux. Apache PHP. Workflow and Tools. Extensible Networking Platform 1

Course and Unix Intro

Unix/Linux: History and Philosophy

Version Control with Git

Lecture 12. Application Layer. Application Layer 1

CSEE 4119 Computer Networks. Chapter 1 Introduction (4/4) Introduction 1-1

INTRODUCTION TO OPERATING SYSTEMS. Jo, Heeseung

Introduction to Linux

Network Security

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Real protection against real threats

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

Introduction to Operating Systems. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Chapter 10: Security and Ethical Challenges of E-Business

1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard)

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Course Outline (version 2)

Certified Cyber Security Analyst VS-1160

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Security and Authentication

Transcription:

Class Freeware, Open Source, and Free Software There is a difference, who knew?

Notes Homework graded I m SORRY Homework 4&5: no homework this week Midterms How was it? Honestly Random, mostly unrelated note on free textbooks.

Trojan Horses Appear to be useful software, but like in the myth, conceal malware to your system. Unlike previous viruses, does not necessarily self replicate Used to create botnets or zombie armies, with which criminals can: Send their own spam or scams Malware such as Key Logging Distributed Denial of Service (DDoS) Attacks

(Distributed) Denial of Service Attacks ([D]DoS) an attempt to make an online service unavailable by overwhelming it with traffic (from multiple sources) http://blog.lifars.com/2015/08/20/ddos-attacksare-stronger-more-in-number-than-ever/

Man in the Middle

Social Engineering An attack that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Baiting: Offering the user something, such as a free download, while hiding malware or obtaining login information 2006 Steve Stasiukonis, VP and founder of Secure Network Technologies, dropped USBs in a client s parking lot that were infected with a Trojan Horse key logger, and was able to obtain a number of employee credentials. Informal Survey: Employees will give away their password for a cheap pen (granted, took place in 2003)

Phishing (Social Engineering) Phishing Fishing for personal information Misdirects users http://www.it.cornell.edu/security/phishbowl.cfm

Phishing (Social Engineering)

Topic Switch!

Moving on Question What does it mean to be Open Source?

Moving on Question What does it mean to be Open Source? OPEN SOURCE The term "open source" refers to something that can be modified because its design is publicly accessible. https://opensource.com/resources/what-open-source OPEN SOURCE INITIATIVE As a global non-profit, The Open Source Initiative (OSI) protects and promotes Open Source, championing Open Source in society through education, collaboration, and infrastructure, stewarding the Open Source Definition (OSD), and preventing abuse of the Open Source concept. http://opensource.org/definition

Next Question What does it mean to be Free Software? Free Software Software that respects users' freedom and community. Roughly, it means that the users have the freedom to run, copy, distribute, study, change and improve the software. Thus, free software is a matter of liberty, not price https://www.gnu.org/philosophy/free-sw.en.html

Last Question So what then is freeware?

Some History UNIX: fancy OS Created by AT&T / Bell Labs early 1970s after attempting Multics ("Multiplexed Information and Computing Service") Ken Thompson, Dennis Ritchie, M. D. McIlroy, and J. F. Ossanna decided to continue on text editor program, instead they created UNICS (UNiplexed Information and Computing Service) Revolutionary because, OS was coded in C Meaning it can outlive the hardware it was built on

Some History UNIX: fancy OS Explodes in 70s-80s 1949 - AT&T involved in an antitrust action with Department of Justice Price-fixing Monopoly on telephones Settled quietly. Important to us, there was a provision that Bell Systems patents be licensed to competitors on request (note, not give away for free, but allow others access to pay for a license of the code)

Some History GNU Operating System: GNU s Not Unix 1983 Richard Stallman (rms) created GNU OS, built on the principle that software should be free (free as in free speech, not free as in free beer). Four Freedoms: 1. Run the program however you want 2. Freedom to understand how the program works (need access to source code) 3. Freedom to redistribute copies 4. Freedom to make improvements and share improvements.

Some History Linux: 1991 Linus Torvalds Wanted to call it Freax = "free + "freak + "x" (as an allusion to Unix)

(distro flavor for this class) TAILS Comes with default most secure settings Uses ToR and I2P Encryptions wherever possible Boots from usb/cd, does not alter host computer OS in any way, leaves no trace on machine

Free Software vs Open Source Open source is a development methodology; free software is a social movement ~Richard Stallman

https://www.youtube.com/watch?v=ag1akil_2gm

Reference to Amazon and 1984 Amazon remotely removed 1984 and Animal Farm from kindle devices from users who had legitimately purchased books These books were added to Amazon by a company that did not have the rights to the books http://www.nytimes.com/2009/07/18/technology/companies/18amazon.htm l?_r=0 The issue: I never imagined that Amazon actually had the right, the authority or even the ability to delete something that I had already purchased. - Charles Slater

Discussion Point If you bought a bootleg paper copy of 1984, Amazon could not break into your house to take it back. Is this different? Is it ok because it was not legitimately purchased? Who is responsible for these infringements? The customer? Amazon? The Seller?

Discussion Point How much right do you have to know about the programs that are running on your computer? How much details about the programs? https://www.pidder.de/blog/2010/03/onlineprivacy-comic/?lang=en