Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
(Informatica) Introduzione Alla Sicurezza Delle Reti E Dei Sistemi Informativi
(Informatica) Introduzione Alla Sicurezza Delle Reti E Dei Sistemi Informativi
Antonio Lioy
< lioy @ polito.it >
Politecnico di Torino
Dip. Automatica e Informatica
CED
WAN
concentratore
LAN
terminali
Ciao,
Ciao, sono
sono Alice
Alice Ciao,
Ciao, sono
sonoBarbara
Barbara
Dimostramelo! Benvenuta
Benvenuta Barbara!
Barbara!
Dimostramelo! Parlo
Parlo con
con
la
la banca?
banca?
Certo!
Certo!
Come
Come puoi
puoidubitarne?
dubitarne?
Sgrinfia
Sgrinfia&& Arraffa
Arraffa S.r.l.
S.r.l.
Barbara Barbara
log log
Che s*?%$#”!
integrità integrità
riservatezza riservatezza
autorizzazione autorizzazione
autenticazione autent.
Laura
Rete
Rete di
di Rete
Rete di
di
comunicazione
comunicazione comunicazione
comunicazione
Pagate 10,000 EURO
ad Antonio Lioy
Che cosa fa la polizia? (2a parte) Che cosa fa la polizia? (3a parte)
“Secondly, they said that even if we did manage to “And finally, they said that since "Wicked" was
meet the $5,000 minimum required for "Wicked's" only 13 years old, nothing much would happen to
activities to qualify as criminal, their staffs were him, even if the preponderance of evidence
overloaded and swamped with cases involving demonstrated that he was behind these attacks.
companies that had lost huge sums of money to They said that a couple of agents might go out to
Internet crime. Furthermore, since the cost of an his home and have a talk with his parents, but in
FBI prosecution was in the neighborhood of this country his youth was an impenetrable shield.
$200,000, they needed to prioritize their cases This, of course, further discouraged the costs
based upon prosecuting criminals who were which would be incurred through any
responsible for causing large dollar losses. investigation.”
"Wicked's" attacks, no matter how annoying, failed
to qualify.”