cybr171 t1 2021 - ecs.wgtn.ac.nz

5
School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko CYBR 171 T1 2021 Ngā whakapūtanga o Te Haumaru rorohiko Cybersecurity Fundamentals Harith Al-Sahaf, Aaron Chen Week 10 – Tutorial

Upload: others

Post on 17-Oct-2021

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CYBR171 T1 2021 - ecs.wgtn.ac.nz

School of

Engineering and Computer ScienceTe Kura Mātai Pūkaha, Pūrorohiko

CYBR 171 T1 2021 Ngā whakapūtanga o Te Haumaru rorohiko

Cybersecurity FundamentalsHarith Al-Sahaf, Aaron Chen

Week 10 – Tutorial

Page 2: CYBR171 T1 2021 - ecs.wgtn.ac.nz

CYBR171: Cybersecurity Fundamentals | Ngā whakapūtanga o Te Haumaru rorohiko

Assignment 2 (part 3)• Q3.1 – you should name the person you are targeting• Q3.2 – you should identify the information you know about them that you are going to

employ in the attack (for example, I don't like apples), document the source of the information (if it is me) ... if it is another staff member using staff directory information is fine but don't do further research just describe how you would do it.

• Q3.3 – should be the steps you could give to someone off the street to carry out the attack (this means specify things like room numbers and locations etc.)

• NOTESo that you should only include one exploit.o that your scenario should not be totally farfetched -- that is don't rely up swaps at birth,

aliens or total face masks. Stick to the realm of the possible.o you do not need to include a phishing email or other evidence (although if you finish the

whole assignment come back and include it, we might look at one or two bonus marks).

slide 1

Page 3: CYBR171 T1 2021 - ecs.wgtn.ac.nz

CYBR171: Cybersecurity Fundamentals | Ngā whakapūtanga o Te Haumaru rorohiko

Assignment 2 (part 5)

https://nordpass.com/most-common-passwords-list/

slide 2

Page 4: CYBR171 T1 2021 - ecs.wgtn.ac.nz

CYBR171: Cybersecurity Fundamentals | Ngā whakapūtanga o Te Haumaru rorohiko

Social engineering, Physical security & Incident response

• DEF CON 15 - Johnny Long No Tech Hackingo https://video.link/w/1c5uc

• You can find Kevin Mitnick at HOPE talking about social engineeringo https://video.link/w/XY4uc

• Physical Security's 15 Greatest Hitso https://www.youtube.com/watch?v=ixhW4X-_qQo

• Incident Response | Cyber Security Crash Courseo https://video.link/w/PpOsc

• The Six Phases of Incident Responseo https://video.link/w/B85uc

slide 3

Page 5: CYBR171 T1 2021 - ecs.wgtn.ac.nz

CYBR171: Cybersecurity Fundamentals | Ngā whakapūtanga o Te Haumaru rorohiko

Quizzes• Week 7 – Web security• Week 8 – Social engineering

slide 4