Friday, May 30, 2008

Data Security / Encryption

After learning about hacking and how it compromises data security, we will learn about the next step in protecting data, by means of encryption. The very ancient and often used in technique of cryptography involves scrambling messages in such a way that only the parties within the communication or, in our case, a computer algorithm and users know how to decode them effectively.
We will first learn the basics on cryptography from the Encryption Tutorial at Webmonkey. Another simple source is What is Cryptography? at WiseGeek.
Subsequently, we will try our skills at decrypting through the CRYPTOCOM Game.

Wednesday, May 28, 2008

Learning about hacking

In order to learn more about hacking, we will play SlaveHack, a custom made web-based game that teaches hacking techniques through a virtual platform.
During this first lesson, you need to do the following:
- Working in pairs, you must create an account. The user name must be made up of the surnames of both members of the groups exclusively.
- Complete the tutorial.
- Start the development of your hacking log. In it, you will answer certain questions and keep a detailed record of your operations.
- As an initial entry to your log, you will answer the following questions referred to what you have carried out during the tutorial:
o What software tools have been used to achieve the break-ins and what was their purpose?
o Which essential operation needed to be performed every time you enter an unauthorized site and why?
- After completing the tutorial, you will be “free” to start hacking other computers in the ITGS group. The objective of the game is to create slaves and gain access to other computers, but do not interfere with virtual computers from other users not belonging to our class. You need to keep a detailed log of all the operations you perform as you progress in the game.

Friday, May 16, 2008

Hacking

After studying networks and the various ways in which businesses and organizations share valuable information, we will analyze the subculture of hacking, its potential threats and implications for individuals and societies.

We will start by watching the following video on the History of Hacking, produced by Discovery Channel:



We will then read an article on the 15 Greatest Hacking Exploits.

After this, we will access the SlaveHack web site. This site features a completely safe and virtual environment that allows you to learn about hacking by participating in an online game that teaches you some of the techniques that hackers use to break into computers.

Tuesday, May 6, 2008

Assignment 8

This is a very important assignment, which will be done in class. A fundamental learning outcome of this course, that intends to mirror a real-life scenario, is to help us to develop skills in going through extensive contents and determining what is relevant.
Your task today, to be done in groups of three members, is to come up with the list of relevant topics that we will be evaluating next week. The suggested procedure is:
Go through the entries in the blog and check the websites that we have seen in class.
Skim through the contents in these sites and, referencing the assignments and what was discussed in class, jot down those topics that we made emphasis on.
Come up with a suggested list of possible ways in which you might be evaluated, taking into account that you will be able to use the Internet, notes and/or any other resources.

DO NOT LEAVE THE CLASS UNTIL I HAVE CHECKED YOU OFF THE LIST AND VERIFIED YOUR TOPICS.

Assignment 7: Network Design

This assignment should be done in pairs utilizing the Wired Lan Modelling feature at the WebLan Designer. Images resulting from the modeling process can be copied and imported into any drawing program, that can be used to add on the lines and labels needed. The assignment should be submitted to itgs.sass@gmail.com before next Wednesday, May 14th.

1) A school has two small campuses that operate at different physical locations. The North campus has a computer lab with 5 workstations and a printer that is connected via a Token Ring Network, and 4 administrative computers and two printers that are networked to each other. A file server and colour printer are accessed by all computers in this campus, which are also connected to the Internet by means of a dedicated cablemodem. The South campus has two computer labs with 6 and 8 computers respectively, plus 5 other computers that are used for teaching and administrative purposes. There is one file server and network printer that must be accessed by all computers in the network. The North Campus will access the Internet via a dedicated cablemodem. Both campuses must be linked.
Draw a detailed diagram of how the network is set up and configured, and write down a brief rationale that explains your network design.


2) A multinational company has branches in Argentina and the US. The Argentina branch has 8 networked computers that are used to handle customer requests and post-sale service, whereas the US office deals with sales and production through 12 computers. Each branch has two network printers and a file server, and they must be connected to each other. Design a network that satisfies the requirements and explain which hardware and/or software solutions you need to adopt.