Task 2 - Attacking and Defending (1)
Task 2 - Attacking and Defending (1)
Table 1. Description.
Aspect Description
1. Type of activity Collaborative
2. Evaluation moment Intermediate
3. Managing unit Escuela de Ciencias Básicas
Tecnología e Ingeniería ECBTI
4. Score of the Choose an 125 points
option
5. The activity starts on: Monday, February 17, 2025
6. The activity ends on: Sunday, March 9, 2025
7. Student independent work 27 Hours
hours
This section aims to understand the topics required for the development
of the activity. The topics of the unit are:
• Pillars of Computer Security
• Risk Management and Security Controls
• Information security programs, processes and policies
• Continuity Plans
Each student chooses one of the questions mentioned above, the question
and the reasoned answer are documented and published in the activity
forum, based on the readings made and their personal criteria.
Additionally, she must make a comment to at least one response from a
colleague, to express her support, complement or disagreement in a
respectful and reasoned way.
Slide 1: Cover.
Slide 2,3,4,5 and 6: Thematic development.
Slide 7: References.
Slide 8. Conclusions.
Individual work:
This activity consists of two parts:
• PART ONE – Defending: Are you aware of the information that anyone
can find out about us without restrictions on the Internet? The
objective is to learn to find what can be known about themselves on
the internet, using OSINT tools (Open Source INTelligence), translated
as Open Source Intelligence. It refers to the set of techniques and tools
to collect public information, analyze the data and correlate it, turning
it into useful knowledge.
Examples:
o https://duckduckgo.com/
o http://es.kgbpeople.com
o https://www.peekyou.com/
o http://www.spokeo.com
o http://webmii.com
1. Cover
2. Objectives
3. Part One: OSINT Tools
3.1. Evidence
3.2. To conclude on what is the criminal capacity of the results obtained
in the exercise
4. Part Two: TOR Browser
4.1. Evidence of installation
4.2. Evidence of navigation
4.3. To conclude on the use in the TOR browser from the criminal part
and its consequences
5. Bibliographic references
The following materials and resources are required for the development
of this activity:
In the initial information environment, you should:
• Please check the course agenda for the dates of the activity.
3. Before submitting the requested product, the group should check that
it complies with all the requirements indicated in this activity guide.
In any case, comply with the referencing standards and avoid academic
plagiarism. To do so, you can support yourself by reviewing your written
products using the Turnitin tool available in the virtual campus.
4. Academic Situations
Consider that in Agreement 029 of December 13, 2013, Article 99, the
following actions are considered as offenses against academic order,
among others: item e) "Plagiarism, that is, presenting as one's own the
entirety or part of a work, paper, document, or invention created by
another person. It also includes the use of false citations or references,
or proposing citations where there is no match between the citation and
the reference," and item f) "Reproducing or copying, for profit,
educational materials or results of research products that have intellectual
property rights reserved for the University."
The academic sanctions that the student will face are as follows:
a) In cases of proven academic fraud in the respective academic work or
evaluation, the grade imposed will be zero points without prejudice to the
corresponding disciplinary sanction.
b) In cases related to proven plagiarism in academic work of any nature,
the grade imposed will be zero points, without prejudice to the
corresponding disciplinary sanction.