Skip navigation
The Australian National University

Laboratory 3 - Information Security

Aim

The aim of this lab is to discuss the material covered in the lectures on the Web 2.0 and Social Media, Security of Information and IT, Malware and other attacks, Mobile Security and Networks. Also, to get some hands on experience with relevant linux networking commands.


Discussion

Preparation

Please go through the slides for the relevant lectures. As well, go through chapters 11 (HTTP-424:426, Email-416:419, VOIP-416:419, VOIP-421:423 and Cloud Computing-427:435), and the required reading for all of the lectures of Roger Clarke (the focus for the quiz will be on the first four lectures, plus the lecture on Networks). Note down any questions that you may have and bring it up at the end of the discussion session.

For the topics covered by Roger Clarke, refer to his discussion topics. For the lecture on Networks, discuss the following:

  1. Discuss the advantages and disadvantages of using forward, open and reverse proxies.
  2. Are there any privacy/security issues with using a proxy?


Linux Networking Commands

Run the following command:

route -n
How many interfaces are there? Do you understand the different parts of the output? Use the man page to figure out the output.

Updated:  Tue Apr 9 16:15:41 EST 2013 / Responsible Officer:   JavaScript must be enabled to display this email address. / Page Contact:   JavaScript must be enabled to display this email address.