Task 1: Please respond to the following in your own words, citing any sources:
1. Describe how to extract forensic information from an email.
2. Describe the TCP/IP protocol and the TCP/IP packet. How can you extract data from the packet and what type of data can you get?
3. What is social engineering and how can you get vital data from social engineering?
4. List and describe the 4 steps of network incident response.
5. What is a cellular network, and in general how does it work?
6. What kind of meaningful data can you forensically extract from a cell phone?
7. In your opinion, what is the best way to counter a zero day attack?
(80 Points)
Task 2: Please answer the following questions, following the required minimum word count. Please cite all sources and avoid any hint of plagiarism. All words should be hand typed by your fingers.
1. You are the cyber security director and your company wants vital information sent to your corporate headquarters through steganography. The data to be sent is 4 sentences. Describe what would need to happen, in basic technical terms, for the steganography to happen. Make sure you read the article and watch the video before answering. Minimum 50 words
2. Describe how blockchain can help secure space assets such as satellites. Go into technical detail. Min 100 words. make sure you read the articles on blockchain in the readings.
3. Research Space Chain, as seen in the brief video. Describe what it is, how it works, and how it can possibly make space assets safe from cyber attacks. Make sure you cite all references. Min 100 words.
4. Research a zero day attack, a specific attack. Describe it in detail and explain the damage it has done. Is there a patch/countermeasure for it? Describe the countermeasure. Min 50 words.
Readings & Media
In Module 4 we will continue with the cyber attacks on satellites case study and explore the basics of Internet, email, network, and mobile device forensics. We will also study steganography a bit more and look into the dreaded Zero Day Attack.
Textbook: Chapter 8 Internet and Email Forensics
This chapter goes over basic Internet and email forensics. Pay close attention to email headers and web browser artifacts in this brief but critical chapter.
Textbook: Chapter 9 Network Forensics
In this chapter we explore basic TCP/IP principles and network based attacks. Pay careful attention to Incident response, as the speed of the incident response to a network attack is absolutely vital to reducing the damage of an attack.
Textbook: Chapter 10 Mobile Device Forensics
This chapter briefly covers how cellular systems work and the basic type of evidence that can be extracted from a cell phone. This is the youngest area of cyber forensics but a very big area.
Article: Steganography in the Modern Attack Landscape
This highly visual article gives you great examples of steganography.
Video: Steganography Basics
Steganography (Links to an external site.)
A short but excellent video on how to hide data in pictures.
Article: Zero Day Attacks
Please read this article before reading the content for this week.
Case Study: Cyber Attacks on Satellites
We will continue on this very critical case study and build on our knowledge from last module.
Article: Attack Vectors in Orbit
This is the article that last week's video was based upon. Note the threats and vulnerabilities listed. Also study the attack methods.
Article: How Blockchain and Space Go Together
https://www.geekwire.com/2019/satellites-blockchain-go-together/ (Links to an external site.)
An in depth article on the use of blockchain to protect cyber space based assets.
Article: Blockchain and Space Security
The ESA is looking into Blockchain as a viable solution against satellite attacks.
Video: Space Chain