DUE DATE: Friday 13th, 2024
OBJECTIVE - This is a student defined project.
The goal here is to clearly and concisely describe a hack and/or an attack done by nefarious actors sometime in history in a technical way.
Since most of our descriptions were of a general nature, I added a requirement that the hack/attack be described in technical terms.
If at any point during evaluating your slide, I ask myself "How" or "Why" that is a VERY good thing.
If you then answer that question (whether it is stated or implied) in a technical way, that is an EVEN BETTER thing.
Here's an example of an incomplete statement:
"The hackers were able to gain entrance through port 45,931."
Very interesting! But how did they do that???
A more complete approach would look something like this:
"The hack is thought to have been conducted by officers of Russian military intelligence (GRU) by surreptitiously installing dongles on various computers in the American Embassy."
Dressed as embassy custodial staff, they infiltrated the American Embassy over the New Year's Holiday and attached those dongles directly to the USB ports on the desktop computers of various high level embassy personal.
They then sent a high frequency (35,000 hz) radio pulse to activate the dongle from a secure location across the treat from the embassy. '
Because the radio pulse was so brief and on such an unusual radio frequency, Embassy security staff were unlikely to detect it.
Once activated, the dongle inserted keyboard tracking software onto that desktop computer. That tracking software then stored all recorded keyboard information for approximately 14 days.
At that point, another high frequency radio pulse was directed at the dongle signaling the dongle to send a "flash" burst of compressed data via blue ray to the smart phone of an intelligence operative who appeared to be reading a newspaper on a bench outside the embassy."
H O W E V E R
You are allowed only 1 paragraph per slide.
How might you get rid of MUCH of that pesky text and turn it into something much more engaging to you audience?
I hope the answer is obvious-- This particular made-up hack would lend itself very nicely to graphics, flow charts, mind map (It's a cool thing!) or other organizing type of software.
Finally, make sure to include active URL links to your sources on the last slide.
I will be evaluating those too.
══════════════════════════
Background stuff-- must be included by is fairly basic and should not be covered in too much detail
-
Include a list of sources on the last slide in MLA format
-
Include "inline" citations. In otherwords, at the end of a bullet point or sentence or other relevent spot include the author's last name in parenthesis (Wolgemuth)
-
Name of the hack
-
Date or Dates of that particular instance
-
Purpose of the Hack/Attack
- Target of the attack
You should provide more than just background information on these:
This is the REAL meat & spuds of the situation and I'll be grading you very tightly on this:
|