Listen to the following case studies:
- Case study EP 79: Dark Basin by January 27th.
- Case study EP 76: Knaves Out by February 3rd.
The goal of this homework is to get you functioning with git, GitHub, and Markdown as we will be using these tools throughout the course. This homework will take you step by step through establishing your GitHub repository, cloning that repository on your local machine, making edits and additions locally and committing them locally, and pushing changes up to your GitHub repository to share with me.
- Do not use directory names with spaces in them within your repository!
- Do not use the
#or other “weird” characters in file or directory names!
- Do not have directories or files in a repository that only differ only in their capitalization!
- Put your repo in a directory that is relatively easy to get to via a command line.
We will use the default git
master branch, i.e., no branching is required in this homework.
README.md for Answers
You will modify the
README.md file in your repo to contain the answers to this homework.
Question 1. (5 pts)
Establishing your GitHub Classroom remote repository.
Go to the link for GitHub classroom given out on Blackboard to create your repository for assignments for this class. Take a screen shot of the web page for your repository and save it to the
Include the screen shot here from above as your solution via Markdown. I got something like this last semester (yours will be different!):
Install Git on your local machine if needed. Clone the repository locally on your machine as explained in the class slides. Take a screen shot of the cloned directory in your file manager (you may need to make hidden folders visible to see the
.git directory) and save it to the
Include the screen shot here from above as your solution via Markdown. I got something like this last semester (yours will be different):
Question 2. (5 pts)
Editing, Committing, and Pushing your local version of
Edit the local (cloned) version of the
README.md file to contain only the following information. Clear out any extra stuff that it may have had at the start. Be sure to fill in your name and NetID with the real values. Leave a blank space in your answer sheet so I know you did this question.
**Your name** **NetID: yourNetID** # Homework #1 Solution ## Question 1 ## Question 2
Commit the changes to your local repository via
images directory delete any sample image files I may have given you. You will want to clear out screen shots from previous assignments as you start a new assignment.
Commit the changes to your local repository. Take a screen shot of the command line after you’ve done the above and issued the command
git log. Include the screen shot from above as your solution via Markdown.
I got something like this last semester:
Push your local changes up to your GitHub repository with the command:
git push. Take a screenshot of the Web page of your GitHub repository that shows part of your rendered
README.md file, i.e., something like
Include the screen shot from above as your solution via Markdown.
Question 3. (10 pts)
(a) Multiple choice Chapter 1
Questions from Chapter 1 of the course text:
See GitHub flavored markdown table extensions to see how to put tables into markdown. This is required for full credit.
(b) Have you been Pwnd?
Visit the website have i been pwned? and input one or more of your email addresses until you find one that has been part of a breach. If none of your emails haven’t been reported in a breach don’t feel too confident, these are only the breaches made public. Take a screenshot of your results
(c) Credential Stuffing
What is credential stuffing? Given my results in part (b) should I be concerned with credential stuffing. What is the “credential” that is being referred to here?
(d) Avoiding Credential Stuffing
Who is responsible for preventing credential stuffing? Are you doing currently doing anything to prevent the stuffing of your credentials? Have you found any free/open source tools to assist you?
Question 4. (10 pts)
(a) Personal Non-Cyber Risk Assessment
Perform a “simplified” qualitative risk assessment for a pet (real, imaginary, or desired). Use the following steps. Note we are not putting a cost on the life of our pet, hence qualitative.
- Describe the asset, i.e., the pet you have or would like to have or that you find entertaining to discuss.
- Produce a list of at least five possible threats to the asset (pet).
- Explain how likely each threat to the asset. Rank the threats in terms the most likely to least likely.
- Come up with a countermeasure to each threat. Explain its costs in terms of time, money, loss of enjoyment, etc…
(b) Personal Cyber Risk Assessment
Perform a “simplified” quantitative risk assessment for your laptop.
- Describe the asset including your data and commercial (expensive) programs that you may be running such as commercial OS. Roughly quantify the amount of data, and the costs for the machine and any expensive programs.
- Describe any unintentional (accidental) threats to the asset
- Describe cyber threats to the asset; Go through the categories of malware and include any that seem appropriate.
- Describe the countermeasure that you take against accidental threats
- Describe the countermeasure that you take against each cyber threat
Question 5. (10 pts)
(a) Confidentiality of Meta Data
Even if cell phone communications are encrypted there is a lot of potential information about the call that can be useful to an adversary, i.e., such as the phone number called, where you are, where the recipient is, how long you talk. All this information will be known to your cellular provider (in the simplified scenario that both you and the person you are calling use the same provider).
Now suppose you visit a general (secure) website on the internet. Make a list of organizations that may learn about your visit and the types of things (meta data) they may learn. Are there other organizations besides the website that your visiting that will know about your visit? Who might they be? (200 words max)
Give examples of unintentional availability issues that you have encountered with:
- Your cell phone
- Your internet connectivity
- A network based service such as gmail, zoom, Blackboard etc…
Would you consider ransomware and attack on availability? Explain your reasoning (200 words max).
In the CIA triangle integrity can be interpreted very broadly, for example, not only the unauthorized modification of some “data”, but also whether the data is in some sense “authentic”, i.e., that it is true, and that it comes from where it is claimed.
With this broader interpretation do “attacks” on integrity (or lack of integrity) play a major role in internet scams and/or phishing attacks? Discuss. (200 words max)