| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Stop wasting time looking for files and revisions. Connect your Gmail, DriveDropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account.

View
 

Abstract Web Infections and Protections WIPP: Personal Privacy and Perfect Security

Page history last edited by Rog Rydberg 7 years, 3 months ago

Web Infections and Protections (WIPP): Personal Privacy and Perfect Security?
Bruce Healton and Arnold Kwong

© All Rights Reserved. Elegant Technology Solutions, 2013


Abstract

Web Infections and Protections (WIPP) is a series of papers, presentations, and technical references developed by Healton, Kwong, and Lancaster (1998-onwards).


The initial purpose of Web Infections and Protections was to research and discuss emerging threats against computers, networks, and infrastructure by new techniques and attack vectors not previously explored. A key analysis technique was the application of biological contagion models to the existence of infectious objects spreading between computing nodes via networks and other connections. Continuing Web Infections and Protections research explores the strategy, protocols, and futures involved with ongoing Security Information Practices, conduct of technical practitioners, and the behavior of the immersive environment we now live in.


This presentation will look at who, how, and why for the daily assaults on your data privacy and security, what steps you can do to mitigate those assaults, and we will make some predictions about the future.


“Web Infections and Protections (WIPP): Personal Privacy and Perfect Security?” gives an overview of the pernicious world of privacy invasion and security lapses with an objective look into methods, motivations, tradeoffs, and potential mitigations. Topics range from perpetrators, methods, modern conveniences, mitigation techniques, and future issues.


The planned discussion is restricted to a light to moderate technical level and is accessible.

Comments (3)

Rog Rydberg said

at 10:17 am on Jul 13, 2013

See Facebook entries at Minnesota Futurists

You don't have permission to comment on this page.