Laboratory 3 - Information Security
Aim
The aim of this lab is to discuss the material covered in the lectures on the Web 2.0 and Social Media, Security of Information and IT, Malware and other attacks, Mobile Security and Networks. Also, to get some hands on experience with relevant linux networking commands.
Discussion
Preparation
Please go through the slides for the relevant lectures. As well, go through chapters 11 (HTTP-424:426, Email-416:419, VOIP-416:419, VOIP-421:423 and Cloud Computing-427:435), and the required reading for all of the lectures of Roger Clarke (the focus for the quiz will be on the first four lectures, plus the lecture on Networks). Note down any questions that you may have and bring it up at the end of the discussion session.
For the topics covered by Roger Clarke, refer to his discussion topics. For the lecture on Networks, discuss the following:
- Discuss the advantages and disadvantages of using forward, open and reverse proxies.
- Are there any privacy/security issues with using a proxy?
Linux Networking Commands
Run the following command:
route -nHow many interfaces are there? Do you understand the different parts of the output? Use the man page to figure out the output.
