Anyone have the answers for the unit 4 exam? Thank you! Show
The creator of this deck did not yet add a description for what is included in this deck.
The creator of this class did not yet add a description for what is included in this class.
Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.
Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet. We use an adaptive study algorithm that is proven to help you learn faster and remember longer.
Unit 4 Lesson 1 Activity Guide - Big Data Sleuth Card
Unit 4 Lesson 3 Unit 4 Lesson 03 Name(s)_______________________________________________ Period ______ Date ___________________
Your Digital SelfYou may already be aware of information about you that is freely available online, but you probably haven’t thought about it from the standpoint of research. Suppose someone were to research you online. What would they be able to find? What connections could they make from the existing data out there to learn even more about you? Conducting Your ResearchYou should look through any publicly available pieces of information online. Start by simply looking up your name in a search engine but then refine your results by adding more specific information, like the place you live. Don’t forget social networks, your school website, or any other websites you frequently use. Record Your FindingsIn the space below record the information you find about yourself. If you know something is available online but can’t get to it now, record it anyway. If you need more space, you can record your findings on the back of this sheet as well.
Now connect the dots. If someone really wanted to find out about you online, given the information above, what would they know about you? They would know I am a 14-16 year old female living in El Segundo California who is interested in music.Of the pieces of information you found above, which do you think poses the biggest threat to your security or privacy? Why do you think so? The age is a threat to my privacy.
Goals:
Instructions:
You should try each of the following - check off the DONE column once you’ve tried it
.Thought Questions:You might want to play with the widget a little bit more in trying to answer these questions, but they can be answered based only on the properties of the Vigenère cipher.
The x-axis represents the letter being encrypted and the y-axis represents the associated letter of the key. The ciphers moves to the intersection between two. On each axis, the letter below keeps moving alphabetically downwards.
A good key is one that is longer than the information being put in, not repetitive, and not a word unto itself. A bad key would be like "AAAAA" or "MYKEY" because those are predictable. A good key, like a good password, would be "AWEVDEPOSA".
Vignere: UXSZMPADAZMEKLFZKLKDOSHJGYZXHRXJZRCZSD_MK Caesar: Z kyzeb Z tre Z kyzeb Z tre Z kyzeb Z tre Random: R bhrml R aem R bhrml R aem R bhrml R aem With a repetitive message like "I think I can", etc. it would be really easy for a hacker to predict the shift or substitution.
Knowing this was a vignere cipher encrypted message would make this very difficult to crack. We would at least need to know the key to decrypt this,
That makes it easier because you could possibly figure out the association between the axes and look at repeated letters every ten, but it would still be extremely difficult.
Answer these questionsThese questions are intended to be answered as part of an activity using http://howsecureismypassword.net. The questions below assume ask you to try things out using that tool.
Length. With each new letter, there are more possibilities for what the password can be. With 1 letter, there are 26 options, but with 2 letters, you've more than doubled that number of options, let alone 10 or 15 or more.
I think it could be a bit longer, just given how exponentially the length of time needed increases once the length is high enough.
Humans are the ones writing these passwords, and so if they follow the rules (8 characters, letters, numbers, symbols, no common phrases or patterns) Hopefully you can now appreciate this comic: http://xkcd.com/936/
Sending Secret Messages without agreeing a on a secret key ahead of time In this activity, cups filled with beans will represent information going back and forth between Alice and Bob. We do this activity to show you a simple version of something called Public Key Encryption so we can introduce you to the basic process of information exchange and to some of the terminology involved (which we’ll get to later). This activity will show a technique for Alice and Bob to send secret messages to each other, without agreeing on a secret key ahead of time, and only by exchanging messages over public, insecure channels. Background: A metaphor -- cup of beans as one-way function
Information Exchange Procedure Materials
Setup
Eve:Eve, you will direct all the action. You should read all the instructions of the procedure out loud to everyone, and Alice and Bob should follow along accordingly. (Alice and Bob can follow along on their sheets as well.) Eve reads…. Alice:
Bob:
Eve:Quick question for Eve: Do you have any idea what secret number Bob is sending to Alice? Note: Unless Bob and Alice put so few beans into the cup that you can clearly see from the outside how many there were, your answer should be “No.” You might be able to make a guess, but you wouldn’t know for sure whether it was right. Okay...move on. Alice:
Recap:
Try it again?
What’s the point of the cups and beans activity?Public key cryptography is what makes secure transactions on the Internet possible. Obviously, computers don’t exchange information with beans in plastic cups; they use data (numbers mostly) and the methods of encryption use some math, which we will see in a later lesson. Here the number of beans represented data and the cups represented encrypted data. In order to see how the real thing works, we need to know some terms so we can talk about it accurately. First, NOTICE:
Asymmetric Keys The cups and beans represent asymmetric (pronounced “A-symmetric”) encryption because the procedure for encrypting a message (which Bob does) is different from the procedure for decrypting the message (which Alice does). Up to this point, the encryption schemes we’ve studied have been symmetric. This means that the key used to encrypt the message is the same key needed to decrypt the message. Private Key In the case of this activity, Alice’s secret number - the number of beans that she put into the cup originally is known as her private key. Only she knows it, and she never shares it with anyone. Public Key The sealed container sitting on the table represents Alice’s public key. In the real world a public key is something related to the private key, that can be safely shared in public, that another person can use to encrypt a message. In this case, the cup with the lid on top. Encrypting (a message) When Bob adds beans to the sealed cup, he is using a public key to encrypt a message. Since they get mixed in with the other beans (which are related to Alice’s private key), no one, not even Bob, knows how many total beans there are. Decrypting (the message) When Alice receives the cup back from Bob, she can decrypt the message by opening the lid and counting the beans. Since she knows how many beans she put in in the first place, she can subtract that number of beans and arrive at the number that Bob intended to send. Public Key Cryptography This entire form of exchange is called Public Key Cryptography. In this form of secure communication, every participant has both a public and a private key. When sending a message, the sender encrypts his message using the public key of the recipient. The real math is actually not that complicated. It essentially uses multiplication and division instead of addition and subtraction. The next lesson shows how it works. Name(s)_______________________________________________ Period ______ Date ___________________ Activity Guide - Multiplication + Modulo SummaryIn this activity you’ll you’ll multiply numbers as input into the modulo operation and explore some interesting properties that relate to cryptography. Goal: Understand how multiplication + modulo can be used to make computationally-hard-to-crack encryption. Tools:
Assumption: You have been introduced to the modulo operation and the “clock” analogy for it. Step 1: Experiment with the Mod ClockGoal: familiarize yourself with properties of the Modulo operation Get your feet wet - play
Questions:
No because when you have a remainder of 13 and you are dividing by 13, you just change the result before by 1. So 26 mod 13 could give you 1 remainder 13, but that would not make sense because when you divide it again by 13, you will get 1, and then you may as well add the two 1's together.
Are these results surprising or interesting? Why or why not? No because this function is just based in basic division. Step 2: Toward encryption - Use multiplication to produce inputsExperiment - Small changes to inputs, big changes to outputs. Using a clock size of 37, let’s multiply two numbers (we’ll call them A and B) to use as input, then make small changes to each while holding the other constant. We’ll always use the formula A * B MOD M. We’ll start with A=20 and B=50 and M=37. So here is the first result... 20 * 50 MOD 37 = 1 Now find in the rest of these values making small adjustments to A and B individually. Use a calculator, if necessary, to compute A * B. Use the Mod Clock to compute the modulus of the result.
Result: What do you notice about these results? Is there a pattern? Could you predict the result of 25 * 50 MOD 37? Yes you just add 13 to the previous result which is the difference between 50 and 37. Experiment 2 - Guessing inputs is hard?: Using a clock size of 101, we’ll give you the value of A and even hold the result of the modulo operation constant. Your task: find a value for B (the blank) that makes the math work out.
Takeaways: Solving modulus equations like 2 * ___ MOD 101 = 1 is “hard” because you can’t solve it like a typical equation. There are no easy patterns or shortcuts like other equations you might see in a math class. As you learned in step 1 (hopefully) there is an infinite list of single values for which ___ MOD 101 = 1. (The list is 1, 102, 203, 304, 405...etc). With multiplication, to solve 2 * ___ MOD 101 = 1 you end up randomly guessing to find some number to multiply by 2 that gives you a result in that list. Things get especially “hard” when you use a prime number as the clock size. Thanks to some special properties of prime numbers with a prime clock size there’s only one solution to each modulus equation. You are guaranteed that there is the number less than the clock size itself, but there are still 100 different values you have to try. With a brute force search you could go through them all in a couple minutes. But what if the clock size were a 50-digit prime number? Encryption! Whenever you have a problem for which the only way to solve it is by random guessing or brute force search over a large range of values, you have a candidate for a encryption. Next you’ll get to try it! Unit Lesson 8
Overview Cybercrime causes huge problems for society - personally, financially, and even in matters of national security. In this video, Jenny Martin from Symantec and Parisa Tabriz from Google explain what cybercrime is, how the same advantages in the Internet’s structure can be exploited as disadvantages, and how to defend against attacks with cybersecurity. Directions
Questions
Credit card numbers, social security and health care information, aerial drones have been hacked
A virus is an executable program that gets installed, usually unintentionally, and harms the user and their computer.
A distributed Denial of Service attack is the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers. A phishing scam is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Protecting against cybercrime is as easy as using strong passwords, checking for authentic websites, installing system security updates as often as possible and not installing untrustworthy software. |