Preskoči na glavno vsebino
Učilnica FRI 23/24
  • Domov
  • Več
Zapri
Preklopi iskalni vnos
Slovenščina ‎(sl)‎
English ‎(en)‎ Slovenščina ‎(sl)‎ Македонски ‎(mk)‎ Русский ‎(ru)‎ 한국어 ‎(ko)‎
Trenutno uporabljate gostujoči dostop
Prijavite se
Domov
Course Activities
BigBlueButton Forumi Naloge Viri
Nedavno dostopani predmeti
You are not enrolled in any courses
  1. ipri3
  2. Homework 1 (DUE BY MONDAY 26.10.2020@12:00)

Homework 1 (DUE BY MONDAY 26.10.2020@12:00)

Zahteve zaključka
Odprto: sreda, 21. oktober 2020, 00.00
Rok za oddajo: ponedeljek, 26. oktober 2020, 12.00

Homework (should reach me by MONDAY 26.10.2020 12:00)

An essay, about 500 words.

Part 1. A thought exercise.
Think of a company / person / Institution, that you would like to attack. Tell me about it, and why they would be a good target.
Describe in a step by step fashion, how you would go about compromising the target, and what would your final goal be. From the beginning.  Briefly describe each step, i.e. (a) I would google the company to find out their domain name. (b) I would look at budget reports to see who the board members are. (c) I would find the emails of the board members. etc.
DO NOT DO ANY OF IT. Not even a little. Not even for fun.

Part 2. Analysis
Look at your report. Look at all actions described there.
List which laws you would be breaking at each step and what the prison sentences are for these offenses, i.e. steps (a) … (e) not breaking any laws. (f) identity theft, up to 3yrs * 2, (g) breaking and entering, up to 2yrs….
Sum up the per partem sentences and report them.
For bonus points, think about which informal norms you would be breaking, and list them.

NB. No need to be wordy. Concise is fine. For homework 1, I will actually tolerate bullet points (but won’t be ecstatic about it). 
The general essay writing rules apply (each paragraph about a separate topic, flow, parsimony, double spaced, avoid fluff). No need to go past 500 words


◄ Sykes, Gresham M., & Matza, David. (1957). Techniques of Neutralization: A Theory of Delinquency
Penetration Testing process and Breach databases [slides] ►
Trenutno uporabljate gostujoči dostop (Prijavite se)
Pridobi mobilno aplikacijo Obvestilo o avtorskih pravicah
Stran poganja Moodle