Posts

Showing posts from January, 2018

Computer Virus Rapid Research (One-Pager)

Image
Cybersecurity and Crime One-Pager Template <change this to your title> Note: All text in Italics, including this text, is intended to be replaced by your responses, and deleted once you’ve completed your one-pager. Overview When did the event happen? Whose data was lost / stolen / leaked? How many people / organizations were affected? Provide any other context necessary to understand the “big picture” of the event. The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred on the internet from 5 September 2013 to late May 2014. The attack utilized a trojan that affected computers running Microsoft Windows. It propagated via infected email attachments, when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography and then takes that private key back to their servers. [1] By then, your data is unable to decrypted without the malware’s private k...

Blown to Bits Chapter 2 Prompt

Prompt: “This lesson is entitled The Cost of ‘Free.’ What does that mean to you now?” “How would you explain The Cost of ‘Free’ to a family member, or person you just met, if you had only 60 seconds?” Reflect on your reading the Wall street Journal below  the reading “Right now, which way are you leaning? Too little privacy? Right amount?“ I am leaning towards too little privacy. Most apps free tend to just want access to information that has no relevance to making a better experience for the user. For example, a puzzle game application wanting to know my phone contacts. However, I’m fine with apps wanting some of my data as long as it is secure, and relevant like Google Maps asking for my location data. “Are you willing to give up some privacy (and potentially some security) to have free access to modern innovative tools - do you trust companies to be good stewards of your data?“ I am willing to give up privacy to have free access to tools. I already do ...

Blown to Bits Chapter 5- Reflection Questions

Homework:  Read Chapter 5 in Blown to Bits (located under forms and docs in the "Blown to Bits" folder. Answer the following reflection questions . Share your reflections with stark.brooklinehighschool@gmail.com as well as post your reflections to your blog: What is encryption? What is cryptography? Provide an example. What is security through obscurity? Why is it bad? What is the key agreement protocol? Why is it important to Internet commerce? What is a certificate? What role does it play in Internet security? Free response: In your opinion are digital signatures more important than handwritten signatures?  Explain your opinion with good reasons Encryption is a way of encoding messages so they can't be read by eavesdroppers. An example would be a Cesar Cipher, it is used to move letters and encode messages. Cryptography is a is the art of sending indecipherable messages. A Vigenere Cipher is a type of cryptography where letters are shifted...