Christmas tree lighting ceremony in Portland Oregon

limiting gender narratives;
August 4, 2017
managing infomation
August 4, 2017
Show all

Christmas tree lighting ceremony in Portland Oregon

Christmas tree lighting ceremony in Portland Oregon

PART A

Introduction
Hundreds were gathered to watch a Christmas tree lighting ceremony in Portland Oregon.  Parked nearby was a van believed to be loaded with explosives?  All that was required to kill innocent men women and children at the ceremony was for a Somali-born teen to dial a particular cell phone number€¦a safe distance from the kill zone. Prior to this event this young terrorist had exchanged coded messages €“ preparation to training for his violent jihad.
Download and read the story to put yourself into the drama.
Background
Mohamed Osman Mohamud,19 has reluctantly allowed you to discover encrypted messages after being lawfully served with a warrant €¦ what ya goin a do when day come for you.
Back at the forensic computer Bat Cave, you and your team decide to refresh your memories and experiences about the job before you by reviewing a few simple lab assignments you enjoyed with your favorite Forensic Computer Class Instructor Mr. Roos, the teacher you owe all that you are today.
Encryption

Remember encryption is changing a piece of text into something else. We do this for privacy €“ someone else reading the encrypted text will not be able to tell what it says. To encrypt a piece of text, you need a key. A key is a very long number. Once the text or file is encrypted, it can be transmitted or stored. To decrypt it later, we need the key again. Because remembering a very long number is difficult, we generally use a pass phrase that is easy to remember (e.g., I Love Lucy). The encryption software generates a key from this pass phrase. For this part of the assignment, visit the website http://www.fourmilab.ch/javascrypt/jscrypt.html.   So here is some practice on how to use the tool:
1.    Assume you want to send a very secret message to your accomplice Igor (you can play both parts). You generate a passphrase by typing in a word or words (I Love Lucy) into the first textbox entitled Key and click the Generate button. You then copy this KEY to a word document for future use. This is Igor’s key to unlock your message to him.
2.    Having generated an encrypted passphrase you call Igor and have him write down the encrypted passphrase (key) character by character.  Remember the pass phrase is case sensitive.
3.    With your encrypted passphrase showing in the Key textbox you now enter your secret message into the second text box entitled Plain Text. Now click the button marked Encrypt. You will see the encrypted text in the 3rd text box entitled Cipher Text.
4.    Copy this encrypted text €“ everything from the beginning ##### to the end message End encrypted message and paste it into your Word document.
5.    Close your browser.
6.    Send this encrypted text to Igor (yourself) by email. We can be assured that nobody can tell what your text contains. Even if your computer screen stays and someone looks at it, they will see the encrypted text and passphrase and not be able to tell what it says.
7.    Now your email to receive the encrypted message you just sent yourself.
8.     a browser and visit the website you previously visited (above).
9.    Copy and paste the encrypted pass phrase from your Word document into the textbox entitled Key.
10.    Now paste the encrypted text received in the email, into the 3rd textbox entitled Cipher Text and then click the Decrypt button.  The decrypted text should appear in the 2nd textbox labeled Plain Text.
11.    Make print screens of this process and what you decrypted.
12.    Now€¦ I have just sent you an encrypted message (below).  Take the following components and plug them in exactly as they are to decode my message.

PASSPHRASE

MSRZA-RBGCX-HOSJA-OKENK-GNWMA-XLVSG-HZSXA-ETIEW-YCIRK-CMIVO-ZHRLO-VBVHT

ENCRYPTED MESSAGE

#####  Encrypted: decrypt with http://www.fourmilab.ch/javascrypt/
ZZZZZ WOLLI HWMKV XXNCN MACSS BEKAP BKSFE TDCWJ ADHQQ QFFTM UCICD
ATNVH HJPKA XNOIU HCHJJ THWJH TTTWL STNBD NPXIJ WEALP RJMKR KLBEQ
WSMFG DRGGC UQQIC HLNOB JQUZZ YYYYY
#####  End encrypted message

13.    Just like in real life, if one wants to make their message less obvious, they might send it in another language.
14.    To receive full credit, submit print screens showing your process to decrypt this secret message. What does it say in English? Include print screens that show me how you figured out the English translation of this secret message.
15.    Convince me with your summary remarks that you understand this assignment.
PART B
Cyber Crimes Glossary
Instructions:  Complete and Internet search for the following terms.  Then in your own words, define each term.  Finally include the web address (hyperlink) to the resource you used to obtain your definition. I will grade down for definitions that are cut and pasted.

1.    CYBER PORNOGRAPHY
2.    EMAIL SPOOFING
3.    INTELECTUAL PROPERTY CRIME
4.    CYBER STALKING
5.    UNAUTHORIZED ACCESS
6.    DATA DIDDLING
7.    INTERNET THEFT
8.    VIRUS ATTACK
9.    SALAMI ATTACK
10.    LOGIC BOMB
11.    TROJAN ATTACK
12.    DENIAL OF SERVICE  ATTACK
13.    DECRYPT
14.    ENCRYPT
15.    PASSPHRASE
16.    WORM ATTACK

Remember to submit this assignment (both parts A and B) as a single document before the due date.

Leave a Reply

Your email address will not be published. Required fields are marked *