Presentation is loading. Please wait.

Presentation is loading. Please wait.

TEL381 Homework Assignments. Outline Grading Format Ethics HW #1 Describe 3 Information Assurance Jobs HW #2 Describe 3 Network Protocols HW #3 Describe.

Similar presentations


Presentation on theme: "TEL381 Homework Assignments. Outline Grading Format Ethics HW #1 Describe 3 Information Assurance Jobs HW #2 Describe 3 Network Protocols HW #3 Describe."— Presentation transcript:

1 TEL381 Homework Assignments

2 Outline Grading Format Ethics HW #1 Describe 3 Information Assurance Jobs HW #2 Describe 3 Network Protocols HW #3 Describe 3 (In)Famous Attacks HW #4 Describe 3 Viruses, Worms, Trojans HW #5 Describe 3 Windows, Unix Vulnerabilities HW #6 Describe 3 Novell, Web Vulnerabilities HW #7 Describe 3 Applications of Cryptography HW #8 Summarize 3 Steganography Articles HW #9 Describe 3 Commercial Firewall Products HW #10 Describe 3 Commercial VPN Products HW #11 HW #12

3 Grading Each Assignment Worth 1.0 Points Homework Assignments Due Week they are Assigned –Special Circumstances: pre-arranged with Instructor –1 Week Late: minus 0.4 point –2 Weeks Late: minus 0.6 point –>2 Weeks Late: minus 1.0 points Criteria –Minor Grammar/Spelling Problems: minus 0.1 points –Minor Formatting Problems: minus 0.1 points –Minor Plagiarism: minus 0.4 points –Major Grammar/Spelling Problems: minus 0.2 points –Major Formatting Problems: minus 0.2 points –Minor Plagiarism: minus 1.0 points

4 Format Follow Format in Syllabus Title Page Must Contain: –Course Number and Title –Homework Title –Homework Number –Date Due –Student Name Separate Page for Each Major Area List of References (Where did you get this information?)

5 Ethics Homework Assignments Accomplish a Number of Things: –Research/Read –Think/Evaluate –Writing –Good Job Skills Students Who Merely “Cut and Paste” From the Internet or Textbooks Will Receive a Zero (0) for That Assignment and May Not Be Given the Opportunity to Repeat the Assignment

6 HW #1 Describe 3 Information Assurance Jobs Use WWW job search engines (monster, dice, computerjobs, hotjobs, etc.) Search on “Information Assurance” or “Network Security” Summarize available jobs in format: –Job title –Responsibilities –Education/Preparation Required –Salary, if available –Exact detailed web page where found Use separate page for each job

7 HW #2 Describe 3 Network Protocols Use WWW or textbook resources From TCP/IP related protocols we have talked about, describe 3 in more detail (e.g., SMTP, FTP, TFTP, SNMP, Telnet, ARP, DNS, ICMP, etc.) Summarize protocols in format: –Protocol name –History –How it works –Exact detailed web page or textbook citation where found Use separate page for each protocol

8 HW #3 Describe 3 Attack Methods Use WWW or textbook resources Describe the details of 3 attack methods (e.g., DoS, DDoS, Buffer Overflow, Out-of-Bounds,, Spoofing, etc.) –For example, just within DoS there are: Boink, Bonk, Hanson, Jolt, Land, NewTear, Pong, Puke, Teardrop, Smurf, Winnuke, Ping of Death, etc. – For example, just within Spoofing there are: Ip Address, Sequence Number, Session Hijacking, Man-in-Middle, DNS Poisoning, Redirects, etc. Summarize attack in format: –Attack name –How it works, attack characteristics –Possible Defenses –Exact detailed web page or textbook citation where found Use separate page for each attack

9 HW #4 Describe 3 Viruses, Worms, Trojans Use WWW or textbook resources Describe the details of 3 viruses, worms or trojans Summarize viruses, worms or trojans in format: –Virus, worm or trojan name –What it does –How it works –Characteristics used to detect –Exact detailed web page or textbook citation where found Use separate page for each virus, worm or trojan

10 HW #5 Describe 3 Windows, Unix Vulnerabilities Use WWW or textbook resources Describe the details of 3 specific vulnerabilities within any version of Windows or Unix Summarize vulnerabilities in format: –Vulnerability name –What happens –How was it or could it be fixed –Exact detailed web page or textbook citation where found Use separate page for each vulnerability

11 HW #6 Describe 3 Novell, Web Vulnerabilities Use WWW or textbook resources Describe the details of 3 specific vulnerabilities within Novell Netware or any Web Servers/Browsers Summarize vulnerabilities in format: –Vulnerability name –What happens –How was it or could it be fixed –Exact detailed web page or textbook citation where found Use separate page for each vulnerability

12 HW #7 Describe 3 Applications of Cryptography Use WWW, magazine, journal or textbook resources Summarize 3 cryptography applications in format: –What is cryptography used for –How is it employed (pictures can be helpful) –Exact detailed web page, magazine, journal or textbook citation where found Use separate page for each application summary

13 HW #8 Summarize 3 Steganography Articles Use WWW, magazine, journal or textbook resources Summarize 3 steganography articles in format: –Article Title –Exact detailed web page, magazine, journal or textbook citation where found –What does article say Use separate page for each article summary

14 HW #9 Describe 3 Commercial Firewall Products Use WWW, magazine, journal or textbook resources Describe 3 Firewall products in detail Summarize products in format: –Product name –Who manufactures it –Features –Cost –Exact detailed web page or textbook citation where found Use separate page for each product

15 HW #10 Describe 3 Commercial VPN Products Use WWW, magazine, journal or textbook resources Describe 3 VPN products in detail Summarize products in format: –Product name –Who manufactures it –Features –Cost –Exact detailed web page or textbook citation where found Use separate page for each product

16 HW #11

17 HW #12


Download ppt "TEL381 Homework Assignments. Outline Grading Format Ethics HW #1 Describe 3 Information Assurance Jobs HW #2 Describe 3 Network Protocols HW #3 Describe."

Similar presentations


Ads by Google