computer security
DESCRIPTION
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2013TRANSCRIPT
![Page 1: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/1.jpg)
Computersecurity
Prof. dr. Frederik Questier - Vrije Universiteit Brussel
Workshop for Lib@web 2014 - International Training Program @ University of AntwerpManagement of Electronic Information and Digital Libraries
![Page 2: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/2.jpg)
This presentation can be found athttp://questier.com
http://www.slideshare.net/Frederik_Questier
![Page 3: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/3.jpg)
Main objectivesof computer security
➢ Confidentiality
➢ of data (secrecy)➢ of persons (privacy)➢ access only by authorized parties
➢ Integrity
➢ data only correctly modified or deleted by authorized parties
➢ Availability
➢ correctly accessible in a timely manner➢ the failure to meet this goal is called a denial of service
![Page 4: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/4.jpg)
Student assignment:
security
➢ Congratulations!➢ You are elected member of the newly established
computer and data security team in your institution.
➢ Make a list of all possible risks that can have an impact on the security and stability of your data and internal and external IT services.
➢ Make a list of recommendations to lower the risks.
![Page 5: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/5.jpg)
What can go wrong?Nature
➢ lightning strike➢ fire➢ flood➢ heat wave – cold wave➢ storm weather, hurricane➢ earthquake➢ tsunami➢ volcano eruption➢ electro magnetic pulse from the sun➢ disease of key employees
![Page 6: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/6.jpg)
What can go wrong?Evil actions by people
➢ break in (hackers - crackers)➢ social engineering
➢ phishing➢ (identity) theft➢ vandalism➢ unhappy employees
➢ sabotage (time bomb)➢ cyber attack, e.g. (Distributed) Denial of Service➢ terrorism➢ war
➢ nuclear bomb
![Page 7: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/7.jpg)
What can go wrong?Malware (malicious software)
➢ virus➢ worm➢ trojan horse➢ rootkit
➢ spyware➢ ransomware
➢ keylogger➢ network sniffer➢ back door➢ dialer
![Page 8: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/8.jpg)
What can go wrong?Infrastructure or services problems
➢ Failure of➢ software (bugs)➢ hardware➢ electricity
➢ power outage or power surge➢ network (cable cut – saturation)➢ airconditioning➢ water pipes –> leak➢ system upgrades➢ service providers (e.g. cloud)
➢ Overload of CPU, memory, storage, network (spam)
![Page 9: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/9.jpg)
What can go wrong?Human errors
➢ Weak security➢ Loss of laptops, smartphones, USB-sticks, …➢ No encryption➢ Passwords leaks or cracks➢ Computer console left unlocked
➢ Misunderstanding computer interface or other mistakes➢ Deleting data➢ Corrupting data
➢ Confiscation of machines
![Page 10: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/10.jpg)
Tools for computer security
![Page 11: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/11.jpg)
Tools for confidentialityOverview
➢ Authorization - Access policies - access control
➢ Authentication – identification
➢ Passwords➢ …
➢ Encryption
➢ Virtual private networking
➢ Auditing – logging
➢ ...
![Page 12: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/12.jpg)
Tools for integrityOverview
➢ Backups
➢ Checksums
➢ Antivirus
➢ ...
![Page 13: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/13.jpg)
Tools for availabilityOverview
➢ Disaster recovery planning
➢ Physical protections
➢ Anti-theft➢ Uninterruptible Power Supply
➢ Redundancies
➢ Intrusion-detection systems
➢ Antivirus software
➢ Firewall
➢ ...
![Page 14: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/14.jpg)
TOOLS FOR CONFIDENTIALITY
![Page 15: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/15.jpg)
Passwords
➢ Don't share them
➢ Not even with computer administrators
➢ Don't write them down
➢ Don't reuse them among different sites
➢ Change them often
➢ Select wise:
➢ Easy to remember➢ Hard to guess (resistant to dictionary attacks)
➢ Password length➢ Large set of characters (caps, lower case, numbers, symbols)
![Page 16: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/16.jpg)
Some notorious password leaks
➢ 2014: 5M Gmail passwords
➢ 2013: 38M Adobe passwords (and source code)
➢ 2013: 250K Twitter passwords
➢ 2012: 12M Apple User IDs stolen by FBI, 1M leaked
➢ 2012: 6M LinkedIn passwords
➢ 2012: 450K plaintext Yahoo passwords
➢ 2012: 1.5M plaintext Youporn passwords
➢ 2009: 10K MS Hotmail, MSN and Live passwords
![Page 17: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/17.jpg)
![Page 18: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/18.jpg)
Johannes Weber, http://blog.webernetz.net/2013/07/30/password-strengthentropy-characters-vs-words/
![Page 19: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/19.jpg)
![Page 20: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/20.jpg)
Biometric identification
➢ Finger print
➢ Voice print
➢ Iris scan
➢ Retinal scan
➢ Convenient
➢ Relative safe
➢ But...
![Page 21: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/21.jpg)
Danger ofbiometric identification?
![Page 22: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/22.jpg)
Danger ofbiometric identification?
➢ You can't change your biometric password once it got leaked
➢ You can't legally refuse to give it, unlike a password (US fifth amendment)
![Page 23: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/23.jpg)
Lock your screen when you leave
![Page 24: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/24.jpg)
Security issues in communication
PrivacyPrivacy
IntegrityIntegrity
AuthenticationAuthentication
Non-repudiationNon-repudiation
Interception Spoofing
Modification Proof of parties involved
![Page 25: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/25.jpg)
Cryptography = secret writing
![Page 26: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/26.jpg)
![Page 27: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/27.jpg)
Cipher
algorithm for performing encryption or decryption➢ Example: Caesar cipher
![Page 28: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/28.jpg)
![Page 29: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/29.jpg)
![Page 30: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/30.jpg)
![Page 31: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/31.jpg)
![Page 32: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/32.jpg)
Great if we can exchange
our messages encrypted!
But how can we safely
exchange our keys?
![Page 33: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/33.jpg)
Symmetric encryptionSender and receiver must both know the same secret key
How to exchange that key over distance???
Asymmetric encryptionSender only needs to know the public key of receiver!
![Page 34: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/34.jpg)
Public key encryptionThe private key can unlock (decrypt)
what is locked (encrypted) with the public key
![Page 35: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/35.jpg)
Public key encryptionCreation of keys
![Page 36: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/36.jpg)
![Page 37: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/37.jpg)
![Page 38: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/38.jpg)
![Page 39: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/39.jpg)
![Page 40: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/40.jpg)
Man-in-the-middle attack
➢ How can Bob know
that Alice's key is really Alice's key
(and not Mallory's)?
![Page 41: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/41.jpg)
Digital certificates
Version #Serial #
Signature AlgorithmIssuer Name
Validity PeriodSubject Name
Subject Public KeyIssuer Unique ID
Subject Unique IDExtensions
Digital Signature
![Page 42: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/42.jpg)
HTTPS SSL exchange
![Page 43: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/43.jpg)
➢ CAcert.org is a community-driven certificate authority that issues free public key certificates to the public (unlike other certificate authorities which are commercial and sell certificates).
➢ CAcert has over 200,000 verified users.
➢ These certificates can be used to digitally sign and encrypt email, authenticate and authorize users connecting to websites and secure data transmission over the Internet.
![Page 44: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/44.jpg)
Web of trustKeysigning parties
![Page 45: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/45.jpg)
Avoid non-encrypted protocols!
➢ Encrypted protocols➢ HTTPS➢ SFTP➢ SSH➢ TOR➢ VPN➢ WEP
(Wired Equivalent Protocol. Weak!)
➢ WPA - WPA2Wi-Fi Protected Access
➢ Non-encrypted protocols➢ HTTP➢ FTP➢ TELNET➢ BitTorrent
![Page 46: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/46.jpg)
![Page 47: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/47.jpg)
Full disk encryption
![Page 48: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/48.jpg)
Full disk encryption
![Page 49: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/49.jpg)
Android encryption
![Page 50: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/50.jpg)
![Page 51: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/51.jpg)
![Page 52: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/52.jpg)
Virtual drive in file container
Encrypted file
container.txt
Mountable as virtual drive
/media/encrypted-disk
/Volumes/encrypted-disk
E:
![Page 53: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/53.jpg)
![Page 54: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/54.jpg)
![Page 55: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/55.jpg)
Virtual Private Networksextends a private (hospital) network across a public (internet) network
encrypted to protect against network sniffing
![Page 56: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/56.jpg)
Internet use through a VPN provider
Sarah A. Downey, http://www.abine.com/blog/2012/petraeuss-emails-werent-private-and-neither-are-yours/
![Page 57: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/57.jpg)
FirewallPrivate versus Demilitarized zone
![Page 58: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/58.jpg)
![Page 59: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/59.jpg)
Private browsing
![Page 61: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/61.jpg)
= The Onion RouterFree Open Source software for anonymity network
![Page 62: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/62.jpg)
➢ Bitcoin = distributed peer-to-peer crypto-currency
➢ Log of chain of digitally-signed transactions to prevent double spending
![Page 63: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/63.jpg)
Edward Snowden:
“Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.”
![Page 64: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/64.jpg)
![Page 65: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/65.jpg)
You can't trust softwareif its source code is hidden
➢ From the European Parliament investigation into the Echelon system (05/18/2001):
“If security is to be taken seriously, only those operating systems should be used whose source code has been published and checked, since only then can it be determined with certainty what happens to the data.”
➢ Cryptographer, computer security expert Bruce Schneier:
“Secrecy and security aren't the same, even though it may seem that way. Only bad security relies on secrecy; good security works even if all the details of it are public."
“If researchers don’t go public, things don’t get fixed. Companies don't see it as a security problem; they see it as a PR problem.”
“Demand open source code for anything related to security”
![Page 66: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/66.jpg)
The Borland Interbase example
➢ 1992-1994: Borland inserted intentional back door into Interbase (closed source database server) allowing local or remote users root access to the machine
➢ 07/2000: Borland releases source code (→ Firebird)
➢ 12/2000: Back door is discovered
![Page 67: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/67.jpg)
![Page 68: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/68.jpg)
Be aware of phishing attacks!
![Page 69: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/69.jpg)
TOOLS FOR INTEGRITY
![Page 70: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/70.jpg)
Make backups!Example: centralized over network
![Page 71: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/71.jpg)
Backups
➢ Use off-site data protection = vaulting● e.g. remote backup (compression, encryption!)
➢ First time and sometimes: full backup➢ Most often: only incremental backup➢ Use a good data retention scheme
➢ e.g. 7 daily, 4 weekly, 12 monthly, all yearly backups➢ Reflect about your time for full restore➢ Test the restore procedure!
➢ “80% of backups fail to restore”
![Page 72: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/72.jpg)
Error detection - Checksum - cryptographic hashe.g. CRC32 (cyclic redundancy check)
MD5 (message digest)SHA-3 (Secure Hash Algorithm)
![Page 73: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/73.jpg)
![Page 74: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/74.jpg)
![Page 75: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/75.jpg)
Scan for malware!
![Page 76: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/76.jpg)
Install software from trusted sources!(avoid if possible P2P or web downloads)
![Page 77: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/77.jpg)
Apply software updates and upgrades!
![Page 78: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/78.jpg)
![Page 79: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/79.jpg)
For import documentssave daily new versions as:
Thesis20131030.odtThesis20131031.odtThesis20131101.odt
...
![Page 80: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/80.jpg)
TOOLS FOR AVAILABILITY
![Page 81: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/81.jpg)
Prepare for disasters!Business continuity planning
= how to stay in business in the event of disaster?
➢ Disaster recovery
● Preventive measures● Detective measures● Corrective measures
![Page 82: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/82.jpg)
Uninterruptible Power SupplyUPS
1)Flywheel
2)Diesel generators
3)Batteries (UPS)
![Page 83: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/83.jpg)
fault tolerance
high availability
redundancy
fail over
![Page 84: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/84.jpg)
RAID: Redundant Arrayof Independent Disks
![Page 85: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/85.jpg)
DDoSDistributed Denial of Service
![Page 86: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/86.jpg)
![Page 87: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/87.jpg)
Questions? Thanks!
Questier.com
Frederik AT Questier.com
www.linkedin.com/in/fquestie
www.diigo.com/user/frederikquestier
www.slideshare.net/Frederik_Questier
![Page 88: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/88.jpg)
Credits➢ Internet Archive, Copyright Bibliotheca Alexandrina, International School of
Information Science (ISIS), http://www.bibalex.org/isis/large/000.jpg
➢ Password Strength, Creative Commons BY-NC http://xkcd.com/936/
➢ Security, Creative Commons BY-NC http://xkcd.com/538/
➢ Zimmermann Telegram, 1917, no known copyright restrictions
➢ Assymetric and symmetric encryption by Jeremy Stretch, http://packetlife.net/blog/2010/nov/23/symmetric-asymmetric-encryption-hashing/
➢ Orange blue public key cryptography, Creative Commons CC0 by Bananenfalter
➢ HTTPS SSL Exchange by Robb Perry, http://coding.smashingmagazine.com/2012/05/17/backpack-algorithms-and-public-key-cryptography-made-easy/
➢ Bitcoin logo, Public Domain by bitboy
➢ Bitcoin Transaction Visual, Creative Commons CC0 by Graingert
➢ Social Icons by Iconshock http://www.iconshock.com/social-icons/
![Page 89: Computer Security](https://reader033.vdocument.in/reader033/viewer/2022042813/54b730ed4a7959772f8b4729/html5/thumbnails/89.jpg)
This presentation was madewith 100% Free Software
No animals were harmed