cybr171 t1 2021 - ecs.wgtn.ac.nz
TRANSCRIPT
School of
Engineering and Computer ScienceTe Kura Mātai Pūkaha, Pūrorohiko
CYBR 171 T1 2021 Ngā whakapūtanga o Te Haumaru rorohiko
Cybersecurity FundamentalsHarith Al-Sahaf, Aaron Chen
Week 10 – Tutorial
CYBR171: Cybersecurity Fundamentals | Ngā whakapūtanga o Te Haumaru rorohiko
Assignment 2 (part 3)• Q3.1 – you should name the person you are targeting• Q3.2 – you should identify the information you know about them that you are going to
employ in the attack (for example, I don't like apples), document the source of the information (if it is me) ... if it is another staff member using staff directory information is fine but don't do further research just describe how you would do it.
• Q3.3 – should be the steps you could give to someone off the street to carry out the attack (this means specify things like room numbers and locations etc.)
• NOTESo that you should only include one exploit.o that your scenario should not be totally farfetched -- that is don't rely up swaps at birth,
aliens or total face masks. Stick to the realm of the possible.o you do not need to include a phishing email or other evidence (although if you finish the
whole assignment come back and include it, we might look at one or two bonus marks).
slide 1
CYBR171: Cybersecurity Fundamentals | Ngā whakapūtanga o Te Haumaru rorohiko
Assignment 2 (part 5)
https://nordpass.com/most-common-passwords-list/
slide 2
CYBR171: Cybersecurity Fundamentals | Ngā whakapūtanga o Te Haumaru rorohiko
Social engineering, Physical security & Incident response
• DEF CON 15 - Johnny Long No Tech Hackingo https://video.link/w/1c5uc
• You can find Kevin Mitnick at HOPE talking about social engineeringo https://video.link/w/XY4uc
• Physical Security's 15 Greatest Hitso https://www.youtube.com/watch?v=ixhW4X-_qQo
• Incident Response | Cyber Security Crash Courseo https://video.link/w/PpOsc
• The Six Phases of Incident Responseo https://video.link/w/B85uc
slide 3
CYBR171: Cybersecurity Fundamentals | Ngā whakapūtanga o Te Haumaru rorohiko
Quizzes• Week 7 – Web security• Week 8 – Social engineering
slide 4