cracking the code on an it career - swinburne … the code on an it career jade khoo patrick...

17
CRICOS 00111D, TOID 3069 Cracking the code on an IT career Jade Khoo Patrick Hosseini & Laura Deans James Hamlyn-Harris

Upload: doanthuy

Post on 24-May-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

CRICOS 00111D, TOID 3069

Cracking the code on an IT careerJade Khoo

Patrick Hosseini & Laura DeansJames Hamlyn-Harris

Snapshot of stories that made news…

2

3

95% of web attacks are financially motivated

The Australian government department

has reported that the average cost of cybercrime

attack to a business is around $276,000

Identity fraud up by 57% as thieves ‘hunt’

on social media’

Hacks that leave you exposed

Nearly 30% of people open

phishing emails, 12% do click the

link or open attached files

Hacker steals 45 million accounts from hundreds of car, tech, sports

forums

In WWII we bombed anddestroyed the electrical

infrastructure of ourenemies. Now we havethe ability, through a

cyberattack, to just shutthe grid down.As we share more of

our lives online,we open ourselves to

being exploited

Siri is always listening

93% of cases hackers took just minutes to breach, while companies tookweeks or months to

discover

CRICOS 00111D, TOID 3069

Things that look secureBy Pat and Laura

March 2016 – Facebook vulnerabilityhttp://www.anandpraka.sh/2016/03/how-i-could-have-hacked-your-facebook.html

Bug bounties and ethical hackingOrganisations set up bug bounty programs to reward hackers who find security flaws in their products– Security researcher Aanand Prakash was paid $15,000 USD for finding

the aforementioned Facebook exploit

Rewards skilled hackers and helps further secure applications

Professional hackers employed to audit Information Security at your worksite are called Penetration Testers

Hacking is the bypassing of systemsSocial engineering– Gaining physical access by manipulating human behaviour– From being polite to dumpster diving– Trust is exploitable– Acquiring physical access to a system is the best possible

result for a malicious person

Guess which password is more secure?Password A: Jd#$1jiA$%g

Password B: MyNameIsP4trickAndIAmC00l

Password policiesWriting down passwords on sticky notes or in notebooks

Storing said sticky notes and notebooks nearby in a desk –maybe the lower one so that its not totally obvious

Passwords vs Passphrases

What is a ‘capture the flag’ challenge?Public competitions where people perform hacking techniques to reveal ‘flags’ to submit and score points for their team

Vary in difficulty

Designed to train and test various skills used in penetration testing

Free CTF challenges provide a good way for students to self-teach

Questions?

11

Thank you

CRICOS 00111D, TOID 3069

Swinburne IT coursesJames Hamlyn-Harris

Information Technology courses

13

Bachelor of Information and Communication Technology

Majors:Business Systems

Network Technology

Systems Analysis

Systems Management

Software Technology

Bachelor of Computer Science (Professional)Bachelor of Computer Science

Majors: Cybersecurity

Network Design

Internet of Things

Data Science

Software Design

Software Development

Games Development

Double degrees:

Bachelor of Engineering (Honours)Bachelor of Games and InteractivityBachelor of Laws

Entry requirements

14

Course Expected 2018 ATAR

Bachelor of Computer Science (Professional) 80+Bachelor of Computer Science 70+Bachelor of Information and Communication Technologies 60+Diploma of Information Technology (UniLink) – (pathway into second year) 50+

VCE prerequisites: Units 3 and 4: a minimum study score of 25 in English (or equivalent) or 30 in English (EAL); and Units 1 and 2: satisfactory completion in two units (any study combination) of any Mathematics.

Vocational education/TAFE qualifications

Entry requirementsEntry into this program is based on an applicant’s study and/or relevant work history. Some additional criteria may also apply.

CoursesAdvanced Diploma of Computer Systems Technology Diploma of Software Development Diploma in Information Technology NetworkingCertificate IV in Information Technology NetworkingCertificate IV in Computer Systems Technology Certificate IV in Information Technology

Questions?

17

Thank you