Andmeturve: tehnoloogia, koolitus ja reeglid

Sissejuhatuseks
Pealkirjaks oleva lause andmeturbe kolmest komponendist on öelnud kunagine USA tagaotsituim inimene, keda FBI tulutult mitu aastat üle kogu riigi jahtis: Kevin Mitnick. Nüüdseks on temast saanud turvaekspert, kes ilmselt teab, millest räägib. Mitnicki sõnul on ka tegemist kolme komponendi korrutise, mitte summaga - kui üks neist on null või nullilähedane, on seda ka kogutulemus. Tänases teemas vaatlemegi andmeturbe eri aspekte.

Pahavara

 * Viirused
 * Trooja hobused
 * Ussid
 * Lunavara

Pettused

 * Levinumad skeemid
 * Scambaiting

Manipulatsioon

 * SE
 * Dumpster diving
 * Shoulder surfing

Viited

 * ALDER, Raven et al. Stealing the Networkː How to Own an Identity. Syngress 2005.
 * ALLSOPP, Wil. Unauthorised Accessː Physical Penetration Testing for IT Security Teams. John Wiley & Sons 2009.
 * ANDREJEVIC, Mark. iSpy: Surveillance and Power in the Interactive Era. University Press of Kansas 2007
 * GOLDSTEIN, Emmanuel. The Best of 2600: A Hacker Odyssey. Wiley 2008.
 * Sarah GRANGER. Social Engineering Fundamentals, Part I: Hacker Tactics. SecurityFocus, December 18 2001
 * Sarah GRANGER. Social Engineering Fundamentals, Part II: Combat Strategies. SecurityFocus, January 9 2002.
 * HAGER, Nicky. Secret Power - New Zealand's Role in the International Spy Network. Craig Potton Publishing 1996. http://www.nickyhager.info/ebook-of-secret-power
 * LONG, Johnny. No Tech Hacking - A Guide to Social Engeering, Dumpster Diving, and Shoulder Surfing. Syngress Publishing 2008 (a chapter is available at http://www.hackersforcharity.org/files/NTH_SAMPLE.pdf)
 * MCCARTHY, Linda. IT Security: Risking the Corporation. Prentice Hall 2003.
 * MITNICK, Kevin D.,SIMON, William L. (2002). The Art of Deception. John Wiley & Sons 2002
 * MITNICK, Kevin D.,SIMON, William L. (2005). The Art of Intrusion. John Wiley & Sons 2005
 * O'CONNOR, TJ. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers. Syngress 2012
 * OLLMANN, Gunter. The Phishing Guide: Understanding and Preventing Phishing Attacks. TechnicalInfo.net 2005
 * STERLING, Bruce. Hacker Crackdown: Law and Disorder on the Electronic Frontier. Bantam Books 1992. http://www.mit.edu/hacker/hacker.html
 * STOLL, Cliff. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books 2005
 * VITALIEV, Dmitri. Digital Security and Privacy for Human Rights Defenders. Front Line 2007. http://www.frontlinedefenders.org/esecman/
 * WINTERFELD, Steve, ANDRESS, Jason. The Basics of Cyber Warfare. Syngress 2013.
 * Attrition.org: security. http://attrition.org/security/
 * The Honeynet Project: Know Your Enemy. http://old.honeynet.org/papers/honeynet/
 * SANS Information Security Resources. http://www.sans.org/security-resources/
 * SANS Reading Room. http://www.sans.org/security-resources/
 * http://www.whatsthebloodypoint.com
 * http://www.scamorama.com
 * http://www.419eater.com