DOC PREVIEW
SIU MGMT 345 - Ivy Bells

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

MGMT 345 1st Edition Lecture 23Outline of Last Lecture: I. SAP Lab #3II. Lab questionsOutline of Current Lecture: I. Notes on the FinalEastern Europe  computer gang has stolen $1 billion in USD from banks in 30+ countriesMore than 680,000 corporate IT accounts had the password “Password1”Vladmir Vetrov (a KGB colonel) brought the Cold War to an end by leaking to the US through France that the KGB was going to steal pipeline software from Canada (1980s). So the US planted a “logic bomb” (destructive code) into the Canadian software and then let the KGB stealit. When the logic bomb detonated it caused the pumps on the new Soviet natural gas line in Siberia to reverse against themselves and eventually burst and ignite, causing the largest non-nuclear explosion ever. Adobe Flash is a giant cookie creator/ tracker. 94% of all viruses and malware enter the computer through a phishing attack (via email) Snopes.comChris Rouland- FBI offered him 15 years in prison or instead he could come to work for them. After he finished working for the FBI in 2008 he started his own company called “End Game.” They do “zero-day exploits” (fixing vulnerabilities before they are even found)365 days is 2014- 370,000,000 new malware created in 2014 aloneSTUXNET Worm  developed between US and Israeli governments to shut down the Iranian nuclear program. They inserted the stuxnet worm into a flash-drive that was given to one of the These notes represent a detailed interpretation of the professor’s lecture. GradeBuddy is best used as a supplement to your own notes, not as a substitute.Iranian officials involved in the nuclear facility. It caused the centrifuges to speed up which in turn melted the bearings and destroyed the centrifuges.NSA Tailored Access Operations- intercept shipments destined for oversees and insert their ownspecial hardware into the system to send info back to the NSA. CISCO (make routers for the internet) is now having to ship their products in farm implement boxes to try and trick the NSA because of the money it is costing them. “Operation Ivy Bells”  this was an NSA operation during the Cold War. They fitted a submarine, the “USS Halibut” with special feet to find a fiber optic cable to intercept Soviet


View Full Document

SIU MGMT 345 - Ivy Bells

Download Ivy Bells
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Ivy Bells and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Ivy Bells 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?