33 itself. You have to look at everything backwards, upside down, |
33 itself. You have to look at everything backwards, upside down, |
34 and sideways. You have to think like an alien.'' |
34 and sideways. You have to think like an alien.'' |
35 \end{quote} |
35 \end{quote} |
36 |
36 |
37 \noindent In this module I like to teach you this security |
37 \noindent In this module I like to teach you this security |
38 mindset. This might be a mindset that you think is very |
38 mindset. This might be a mindset that you think is very foreign to you |
39 foreign to you (after all we are all good citizens). I beg to |
39 (after all we are all good citizens and not ahck into things). I beg |
40 differ: You have this mindset already when in school you were |
40 to differ: You have this mindset already when in school you were |
41 thinking, at least hypothetically, in which ways you can cheat |
41 thinking, at least hypothetically, in which ways you can cheat in an |
42 in an exam (whether it is about hiding notes or looking over |
42 exam (whether it is about hiding notes or looking over the shoulders |
43 the shoulders of your fellow pupils). Right? To defend a |
43 of your fellow pupils). Right? To defend a system, you need to have |
44 system, you need to have this kind mindset and be able to |
44 this kind mindset and be able to think like an attacker. This will |
45 think like an attacker. This will include understanding |
45 include understanding techniques that can be used to compromise |
46 techniques that can be used to compromise security and privacy |
46 security and privacy in systems. This will many times result in |
47 in systems. This will many times result in insights where |
47 insights where well-intended security mechanism made a system actually |
48 well-intended security mechanism made a system actually less |
48 less secure.\smallskip |
49 secure.\smallskip |
|
50 |
49 |
51 {\Large\bf Warning!} However, don’t be evil! Using those |
50 {\Large\bf Warning!} However, don’t be evil! Using those |
52 techniques in the real world may violate the law or King’s |
51 techniques in the real world may violate the law or King’s |
53 rules, and it may be unethical. Under some circumstances, even |
52 rules, and it may be unethical. Under some circumstances, even |
54 probing for weaknesses of a system may result in severe |
53 probing for weaknesses of a system may result in severe |