1 3

advertisement
SI110 Homework
Alpha: ________ Name: ____________________ Page 1 of
Collaboration Policy: Default
choose one: □ None □ XS110 □ EI with:
(or more)
□ MGSP
□ Discussed with: ____________________________
Homework:
3
/SI110/Cyber Battlefield/Intro to Cyber Domain
Read the course policy and its enclosures before completing Questions 1 - 4.
For each of the following scenarios circle whether there was or was not a violation of course
policy, assume the default collaboration policy listed in the course policy for the assignment type
in question unless otherwise stated. Justify your answer by indicating the associated
collaboration policy.
1. [ 10 / 10 / 0 ] On a homework assignment, MIDN X asks MIDN Y about applying the Pillars
of Cyber Security to a given scenario. MIDN Y explains the Pillars of Cyber Security without
showing MIDN X her own assignment, which MIDN Y had previously completed.
MIDN X is:
In Violation / Not In Violation
MIDN Y is:
In Violation / Not In Violation
2. [ 10 / 10 / 0 ] During an exam comprised of short answer and fill in the blank questions,
MIDN X is caught looking at MIDN Y’s exam. MIDN X has answers on his exam that exactly
match MIDN Y’s answers. There is no evidence that MIDN Y knew about MIDN X’s actions.
MIDN X is:
In Violation / Not In Violation
MIDN Y is:
In Violation / Not In Violation
3. [ 10 / 10 / 0 ] At the end of a lab period, MIDN X realizes he hasn’t been paying attention and
asks MIDN Y for the answer to “HDD size in GB.” MIDN Y shows MIDN X her own
completed lab worksheet; MIDN X copies the answers from MIDN Y’s lab worksheet, and
MIDN Y knows that MIDN X copied her answers.
MIDN X is:
In Violation / Not In Violation
MIDN Y is:
In Violation / Not In Violation
4. [ 10 / 10 / 0 ] On a homework assignment, MIDN X and MIDN Y get together to discuss the
assignment. MIDN X and MIDN Y discuss various topics covered in the assignment, but
independently phrase their answers on their individual assignment.
MIDN X is:
In Violation / Not In Violation
MIDN Y is:
In Violation / Not In Violation
SI110 Homework
Alpha: ________ Name: ____________________ Page 2 of
Collaboration Policy: Default
choose one: □ None □ XS110 □ EI with:
(or more)
□ MGSP
□ Discussed with: ____________________________
3
Read Chapter 1 from Richard A. Clarke’s Cyber War. Mr. Clarke has graciously made this
chapter freely available to USNA Midshipmen. You can download Chapter 1 (not for
redistribution) at:
http://rona.cs.usna.edu/~si110/resources/readings/index.html
5. [ 10 / 8 / 5 / 0 ] SI110 is divided into three sections: The Cyber Battlefield, Security Tools, and
Cyber Operations. Chapter 1 of Clarke’s book doesn’t really talk about defense, so there isn’t
much for us to say about Security Tools. But we do see examples in the incidents described in
the chapter of the Cyber Battlefield. Give one example from the reading of a strictly cyber attack
on a strictly cyber asset, i.e. one example that took place solely on the Cyber Battlefield.
a.
b.
c.
d.
Dropping bombs on buildings housing Iraqi air defense command and control servers.
Using stealth technology to hide UAVs from Syrian radar.
Splicing into fiber optic cables connected to Syrian air defense computers.
Sending network traffic to international banks, appearing to originate in Georgia, but
coming from a Russian botnet.
6. [ 15 / 12 / 8 / 0 ] Clarke writes about the somewhat surprising cyber attack from North Korea.
North Korea has very few computers connected to the Internet, and yet it appears to have
marshaled 40,000 computers to take part in a DDOS (distributed denial of service) attack.
Explain where these computers were, and how they came to be involved in this cyber attack.
7. [ 5 / 3 / 2 / 0 ] In your current Midshipman role, which aspect of the Cyber Domain are you
directly associated with?
SI110 Homework
Alpha: ________ Name: ____________________ Page 3 of
Collaboration Policy: Default
choose one: □ None □ XS110 □ EI with:
(or more)
□ MGSP
□ Discussed with: ____________________________
3
8. [ 30 / 20 / 10 / 0 ] Complete the below diagram with the names of the aspects of the Cyber
Domain.
Aspect
Description
A terrorist uses the cyber domain to communicate his plans.
The terrorist uses applications on cell phones and laptops to
communicate.
A record of the terrorist communications can be seen on the
webservers, chat servers and communications they use.
When accessing the internet, the communications travel
wirelessly to a cell tower, through wires from the cell tower to the
local Internet Service Provider (ISP), and through a Satellite when
connecting to the rest of the Internet.
By using the physical location of the ISP and cell tower, we can
locate the geographic location of the terrorist.
Download