CISC280 project 7

.docx

School

Northampton County Area Community College *

*We aren’t endorsed by this school

Course

280

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by UltraTurtle1405

Report
CISC280 – Project 7 1. Kalamazoo College requires that all computers connected to the campus network be running up-to-date antivirus software. When a student’s computer is discovered to have a virus, its network connection is cut until a staff member can remove the virus. If it turns out that the computer was not running up-to-date antivirus software, the student is fined $100. Is this an ethically justifiable policy? Yes it is, because the student not having up-to-date AV software put the entire campus network at risk. If ransomware is introduced to the network, everyone on the network will be affected regardless of whether or not they have up-to-date AV software installed on their computers. 2. Millions of American homes are equipped with wireless networks. If the network is not made secure, any nearby computer with a wireless card can use the network. The range of home wireless networks often extends into neighboring homes, particularly in apartment complexes. If your neighbor’s wireless network extends into your home, is it wrong to use that network to get free Internet access? No, I don’t believe it is wrong, but in doing so, you take on all the risks associated with using an unsecured network, including having your information stolen (just as the owner of the unsecured network does). 3. The University of Calgary offered a senior-level computer science course called “Computer Viruses and Malware.” The course taught students how to write viruses, worms, and Trojan horses. It also discussed the history of computer viruses and taught students how to block attacks. All course assignments were done on a closed computer network isolated from the Internet. Some computer security experts criticized the University for offering the course. One researcher said, “No one argues criminology students should commit a murder to understand how a murderer thinks.” What is your position on whether the University of Calgary was right or wrong to offer the course? I believe they were right to offer the course. Learning how to write malware helps tremendously in learning how to block malware. There is a huge difference between teaching someone that 1 + 1 = 2 and teaching them WHY 1 + 1 = 2. Teaching the why provides the building blocks to apply the concept to other scenarios. To put learning how to write malware on par with committing a murder is comparing apples and alternators. 4. East Dakota has decided to allow its citizens to vote over the Web in the presidential election, if they so desire. Thirty percent of the eligible voters choose to cast their ballots over the Web. The national election is so closely contested that whoever wins the electoral votes of East Dakota will be the next president. After the election, state elections officials report the vote tally and declare candidate X to be the winner. Two weeks after the inauguration of President X, state officials uncover evidence of massive electoral fraud. Some voters were tricked into connecting to a phony voting site. The organization running the phony site used the credentials provided by the duped voters to connect to the actual voting site and cast a vote for candidate X. State officials conclude the electoral fraud may have changed the outcome of the election, but they cannot say for sure. They have no evidence that candidate X knew anything about this scheme to increase his vote tally. Discuss the proper response to this revelation. For guidance, consult Article II, Section 1, and Amendment XII to the United States Constitution (see copy at the end of the project). The United States Constitution does not provide clear procedures for how to handle questions of legitimacy after the fact — especially when those questions involve the presidency. The standard for invalidating an election result and holding another vote is quite high. According to University of Memphis law professor Steven Mulroy, courts will usually entertain this option only if they determine a violation of rules that would change the election outcome. In this particular case, this would likely require proving tampering where the vote was close enough to change the result in the Electoral College. In that case, East Dakota would vote again, not the entire country. But
CISC280 – Project 7 this is new territory, and there is no legal precedent for this particular situation. As an election worker, the only proper response I can state with certainty is that online voting should not be allowed. 5. The US and Israel cooperated to unleash the Stuxnet worm, which apparently slowed down Iran’s nuclear program by damaging centrifuges processing uranium. Was unleashing the Stuxnet worm morally justifiable? Why? I do not believe it was. While it did delay Iran’s ability to enrich uranium to weapons-grade, the US is grossly unprepared to have an attack on par with Stuxnet turned back around on ourselves. Angering a country with the nuclear abilities of Iran isn’t exactly conducive to human longevity. 6. Do you support the actions of Anonymous? [ https://en.wikipedia.org/wiki/Anonymous_(group) ] Why or why not? Would you consider becoming an Anon? I support Anonymous’ exposing of critical security flaws. While I support their doxxing of pedophiles, I would never consider becoming an Anon. They’re not organized enough as a group to have much credibility in my eyes. Anyone with the tech savvy to do so can cause a DDoS attack and call themselves Anonymous. 7. Why is it dangerous for an email program to open attachments automatically, without waiting for the user to select them? Malware can be embedded in email attachments, and having them open automatically can cause them to damage your computer and spread to others. 8. If converting SCADA systems to the Internet Protocol increases the risk of a hacker taking control of an industrial process, why are companies doing just that? Internet Protocol saves companies money and allows them to do remote maintenance and monitoring. 9. In a study done in London, people in subway stations were offered a cheap pen in return for disclosing their passwords. About 90 percent offered their passwords in return for the pen [119]. What can be done to get people to take security more seriously? Public awareness campaigns could be conducted to alert people to how easy it is for someone to obtain your information and use it for malicious purposes. These campaigns could inform people about such things as those Facebook “getting to know you” games, the “first letter of your first name, month you were born” memes, and the games where you figure out what your stripper name is (name of your first pet and the street you grew up on), which are used to gather personal information which people most likely use as their security question answers. 10. The default administrator password on many, if not most, home network routers never gets changed, making these computers vulnerable to malware. What would be the advantages and disadvantages of requiring the manufacturers of network routers to create a unique password for every unit they sell? An obvious advantage to every router having its own unique password is that it would make it quite difficult for the router to be hacked. A possible disadvantage is that, if you needed to access your router and can’t find your router password, you couldn’t look it up online. Other than that, I really can’t imagine a disadvantage to requiring every router to have its own unique password. 11. Describe three “low-tech” methods that hackers have used to obtain login names and passwords.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help