Notes for Security Vulnerabilities By Scott Granneman & Jans Carton Find the presentation at http://www.granneman.com/presentations/ ## Slide 3 http://www.granneman.com ## Slide 21 https://en.wikipedia.org/wiki/Malware ## Slide 36 http://kalasinar.deviantart.com/art/Trojan-Horse-22433724 ## Slide 47 https://en.wikipedia.org/wiki/Ransomware ## Slide 50 https://en.wikipedia.org/wiki/Ransomware ## Slide 51 41%: http://www.cybersec.kent.ac.uk/Survey2.pdf Profits: http://www.zdnet.com/cryptolockers-crimewave-a-trail-of-millions-in-laundered-bitcoin-7000024579/ ## Slide 57 Bruce Schneier’s Crypto-Gram, April 15, 2004 ## Slide 61 Image by wintering from iStockPhoto () ## Slide 62 http://www.computerworld.com/printthis/2004/0,4814,91313,00.html ## Slide 83 Dog Education by alkir, licensed from Can Stock Photo, http://www.canstockphoto.com/dog-education-19161190.html ## Slide 84 Stressed man with laptop; licensed through Shutterstock