TEL381 Homework Assignments
Outline Grading Format Ethics HW #1 Describe 3 Information Assurance Jobs HW #2 Describe 3 Network Protocols HW #3 Describe 3 (In)Famous Attacks HW #4 Describe 3 Viruses, Worms, Trojans HW #5 Describe 3 Windows, Unix Vulnerabilities HW #6 Describe 3 Novell, Web Vulnerabilities HW #7 Describe 3 Applications of Cryptography HW #8 Summarize 3 Steganography Articles HW #9 Describe 3 Commercial Firewall Products HW #10 Describe 3 Commercial VPN Products HW #11 HW #12
Grading Each Assignment Worth 1.0 Points Homework Assignments Due Week they are Assigned –Special Circumstances: pre-arranged with Instructor –1 Week Late: minus 0.4 point –2 Weeks Late: minus 0.6 point –>2 Weeks Late: minus 1.0 points Criteria –Minor Grammar/Spelling Problems: minus 0.1 points –Minor Formatting Problems: minus 0.1 points –Minor Plagiarism: minus 0.4 points –Major Grammar/Spelling Problems: minus 0.2 points –Major Formatting Problems: minus 0.2 points –Minor Plagiarism: minus 1.0 points
Format Follow Format in Syllabus Title Page Must Contain: –Course Number and Title –Homework Title –Homework Number –Date Due –Student Name Separate Page for Each Major Area List of References (Where did you get this information?)
Ethics Homework Assignments Accomplish a Number of Things: –Research/Read –Think/Evaluate –Writing –Good Job Skills Students Who Merely “Cut and Paste” From the Internet or Textbooks Will Receive a Zero (0) for That Assignment and May Not Be Given the Opportunity to Repeat the Assignment
HW #1 Describe 3 Information Assurance Jobs Use WWW job search engines (monster, dice, computerjobs, hotjobs, etc.) Search on “Information Assurance” or “Network Security” Summarize available jobs in format: –Job title –Responsibilities –Education/Preparation Required –Salary, if available –Exact detailed web page where found Use separate page for each job
HW #2 Describe 3 Network Protocols Use WWW or textbook resources From TCP/IP related protocols we have talked about, describe 3 in more detail (e.g., SMTP, FTP, TFTP, SNMP, Telnet, ARP, DNS, ICMP, etc.) Summarize protocols in format: –Protocol name –History –How it works –Exact detailed web page or textbook citation where found Use separate page for each protocol
HW #3 Describe 3 Attack Methods Use WWW or textbook resources Describe the details of 3 attack methods (e.g., DoS, DDoS, Buffer Overflow, Out-of-Bounds,, Spoofing, etc.) –For example, just within DoS there are: Boink, Bonk, Hanson, Jolt, Land, NewTear, Pong, Puke, Teardrop, Smurf, Winnuke, Ping of Death, etc. – For example, just within Spoofing there are: Ip Address, Sequence Number, Session Hijacking, Man-in-Middle, DNS Poisoning, Redirects, etc. Summarize attack in format: –Attack name –How it works, attack characteristics –Possible Defenses –Exact detailed web page or textbook citation where found Use separate page for each attack
HW #4 Describe 3 Viruses, Worms, Trojans Use WWW or textbook resources Describe the details of 3 viruses, worms or trojans Summarize viruses, worms or trojans in format: –Virus, worm or trojan name –What it does –How it works –Characteristics used to detect –Exact detailed web page or textbook citation where found Use separate page for each virus, worm or trojan
HW #5 Describe 3 Windows, Unix Vulnerabilities Use WWW or textbook resources Describe the details of 3 specific vulnerabilities within any version of Windows or Unix Summarize vulnerabilities in format: –Vulnerability name –What happens –How was it or could it be fixed –Exact detailed web page or textbook citation where found Use separate page for each vulnerability
HW #6 Describe 3 Novell, Web Vulnerabilities Use WWW or textbook resources Describe the details of 3 specific vulnerabilities within Novell Netware or any Web Servers/Browsers Summarize vulnerabilities in format: –Vulnerability name –What happens –How was it or could it be fixed –Exact detailed web page or textbook citation where found Use separate page for each vulnerability
HW #7 Describe 3 Applications of Cryptography Use WWW, magazine, journal or textbook resources Summarize 3 cryptography applications in format: –What is cryptography used for –How is it employed (pictures can be helpful) –Exact detailed web page, magazine, journal or textbook citation where found Use separate page for each application summary
HW #8 Summarize 3 Steganography Articles Use WWW, magazine, journal or textbook resources Summarize 3 steganography articles in format: –Article Title –Exact detailed web page, magazine, journal or textbook citation where found –What does article say Use separate page for each article summary
HW #9 Describe 3 Commercial Firewall Products Use WWW, magazine, journal or textbook resources Describe 3 Firewall products in detail Summarize products in format: –Product name –Who manufactures it –Features –Cost –Exact detailed web page or textbook citation where found Use separate page for each product
HW #10 Describe 3 Commercial VPN Products Use WWW, magazine, journal or textbook resources Describe 3 VPN products in detail Summarize products in format: –Product name –Who manufactures it –Features –Cost –Exact detailed web page or textbook citation where found Use separate page for each product
HW #11
HW #12