SI110 Homework Alpha: ________ Name: ____________________ Page 1 of Collaboration Policy: Default choose one: □ None □ XS110 □ EI with: (or more) □ MGSP □ Discussed with: ____________________________ Homework: 3 /SI110/Cyber Battlefield/Intro to Cyber Domain Read the course policy and its enclosures before completing Questions 1 - 4. For each of the following scenarios circle whether there was or was not a violation of course policy, assume the default collaboration policy listed in the course policy for the assignment type in question unless otherwise stated. Justify your answer by indicating the associated collaboration policy. 1. [ 10 / 10 / 0 ] On a homework assignment, MIDN X asks MIDN Y about applying the Pillars of Cyber Security to a given scenario. MIDN Y explains the Pillars of Cyber Security without showing MIDN X her own assignment, which MIDN Y had previously completed. MIDN X is: In Violation / Not In Violation MIDN Y is: In Violation / Not In Violation 2. [ 10 / 10 / 0 ] During an exam comprised of short answer and fill in the blank questions, MIDN X is caught looking at MIDN Y’s exam. MIDN X has answers on his exam that exactly match MIDN Y’s answers. There is no evidence that MIDN Y knew about MIDN X’s actions. MIDN X is: In Violation / Not In Violation MIDN Y is: In Violation / Not In Violation 3. [ 10 / 10 / 0 ] At the end of a lab period, MIDN X realizes he hasn’t been paying attention and asks MIDN Y for the answer to “HDD size in GB.” MIDN Y shows MIDN X her own completed lab worksheet; MIDN X copies the answers from MIDN Y’s lab worksheet, and MIDN Y knows that MIDN X copied her answers. MIDN X is: In Violation / Not In Violation MIDN Y is: In Violation / Not In Violation 4. [ 10 / 10 / 0 ] On a homework assignment, MIDN X and MIDN Y get together to discuss the assignment. MIDN X and MIDN Y discuss various topics covered in the assignment, but independently phrase their answers on their individual assignment. MIDN X is: In Violation / Not In Violation MIDN Y is: In Violation / Not In Violation SI110 Homework Alpha: ________ Name: ____________________ Page 2 of Collaboration Policy: Default choose one: □ None □ XS110 □ EI with: (or more) □ MGSP □ Discussed with: ____________________________ 3 Read Chapter 1 from Richard A. Clarke’s Cyber War. Mr. Clarke has graciously made this chapter freely available to USNA Midshipmen. You can download Chapter 1 (not for redistribution) at: http://rona.cs.usna.edu/~si110/resources/readings/index.html 5. [ 10 / 8 / 5 / 0 ] SI110 is divided into three sections: The Cyber Battlefield, Security Tools, and Cyber Operations. Chapter 1 of Clarke’s book doesn’t really talk about defense, so there isn’t much for us to say about Security Tools. But we do see examples in the incidents described in the chapter of the Cyber Battlefield. Give one example from the reading of a strictly cyber attack on a strictly cyber asset, i.e. one example that took place solely on the Cyber Battlefield. a. b. c. d. Dropping bombs on buildings housing Iraqi air defense command and control servers. Using stealth technology to hide UAVs from Syrian radar. Splicing into fiber optic cables connected to Syrian air defense computers. Sending network traffic to international banks, appearing to originate in Georgia, but coming from a Russian botnet. 6. [ 15 / 12 / 8 / 0 ] Clarke writes about the somewhat surprising cyber attack from North Korea. North Korea has very few computers connected to the Internet, and yet it appears to have marshaled 40,000 computers to take part in a DDOS (distributed denial of service) attack. Explain where these computers were, and how they came to be involved in this cyber attack. 7. [ 5 / 3 / 2 / 0 ] In your current Midshipman role, which aspect of the Cyber Domain are you directly associated with? SI110 Homework Alpha: ________ Name: ____________________ Page 3 of Collaboration Policy: Default choose one: □ None □ XS110 □ EI with: (or more) □ MGSP □ Discussed with: ____________________________ 3 8. [ 30 / 20 / 10 / 0 ] Complete the below diagram with the names of the aspects of the Cyber Domain. Aspect Description A terrorist uses the cyber domain to communicate his plans. The terrorist uses applications on cell phones and laptops to communicate. A record of the terrorist communications can be seen on the webservers, chat servers and communications they use. When accessing the internet, the communications travel wirelessly to a cell tower, through wires from the cell tower to the local Internet Service Provider (ISP), and through a Satellite when connecting to the rest of the Internet. By using the physical location of the ISP and cell tower, we can locate the geographic location of the terrorist.