0% found this document useful (0 votes)
17 views6 pages

Jack Totten - 1.1.2 Cyberspace and Cybersecurity Scavengerhunt Activity

The document provides an overview of cybersecurity and the origins of the internet, detailing key organizations, technologies, and historical events that shaped its development. It also discusses data protection, the impact of GDPR, and the differences in internet access across populations. Additionally, it examines the growing threat of cyberattacks and the contrasting perspectives of the US and China regarding internet control and freedom of speech.

Uploaded by

prometheusity
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views6 pages

Jack Totten - 1.1.2 Cyberspace and Cybersecurity Scavengerhunt Activity

The document provides an overview of cybersecurity and the origins of the internet, detailing key organizations, technologies, and historical events that shaped its development. It also discusses data protection, the impact of GDPR, and the differences in internet access across populations. Additionally, it examines the growing threat of cyberattacks and the contrasting perspectives of the US and China regarding internet control and freedom of speech.

Uploaded by

prometheusity
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

JACK TOTTEN

WHAT IS CYBERSECURITY?
CYBERSPACE AND CYBERSECURITY
CYBERSPACE AND CYBERSECURITY SCAVENGER HUNT

Instructions: Locate the answers to the following questions by


reading the Cyberspace and Cybersecurity module.

Files or Resources Needed:


https://world101.cfr.org/global-era-issues/cyberspace-and-cyberse
curity/what-are-cyberspace-and-cybersecurity

EXERCISE 1 THE ORIGINS OF THE INTERNET (WORLD 101 - LESSON 4)

Answers: Questions
MIT and the Department of 1. Name the organizations involved in the
Defense development of Arpanet, the predecessor of
today’s Internet.

Stanford and University of 2. Name the institutions where the first two nodes
California of Arpanet were located in 1969.

Internet Engineering Task 3. What is the name of the organization formed in


Force /IETF 1986 to establish and guide internet architecture
and standards?

Page | 1

This document is licensed with a Creative Commons Attribution 4.0 International License
Robert Tappan Morris created the 4. In 1988, who was responsible for the first
Morris worm solely for analysis malicious internet-based attack?
but it turned malicious.

CompuServe created the first 5. What was significant about CompuServe? You can
commercially used dial up service also watch their commercial
which ended ARPANET https://youtu.be/YfUyR1wlcus.

Tim Burners-Lee of the European 6. Find the year 1991 and read about Tim
Organization for Nuclear Research Berners-Lee. What did he contribute?
(CERN), introduced the world wide
web. To create the WWW he
created the technology behind
Hypernet markup language
(HTML), and the universal
resource locator (URL)
It allows the internet to be able to 7. What distinguishes the Internet from the World
share information instead of just ftp Wide Web?

DARPA project described what 8. In the early 1960’s what was the spirit of the
ARPANET and the internet would DARPA project as envisioned by JCR Licklider?
become.

1. The World Wide Web was 9. The 1990s were a pivotal time for the
made instead of having the development of the Internet. List 3 important
internet be used for file developments from this decade and explain the
transfer, it enables it to be significance of each.
used for so much more for
example, carrying
information.

2. HTML was created, HTML is


used for every website
today and its how you can
view contents on a page
Page | 2

This document is licensed with a Creative Commons Attribution 4.0 International License
3. URL was created and it is
the only way you can view
websites online.
No one is in charge of the internet, 10. Who is in charge of the Internet?
because the internet is just a set of
protocols, like tcp/ip.

EXERCISE 2 HOW COMPANIES AND GOVERNMENTS DO (AND DON’T)


PROTECT YOUR DATA (WORLD 101 - LESSON 7)
Please answer the questions below:
1. What is a data center?
Data centers are large servers that store up-words to thousands of terabytes worth of
personal information. Such as passwords, usernames, cookies, and more information that
should be secure.

2. Does it matter where (geographic location) your data is stored? Explain your answer.
Yes. Data that's stored in remote areas can be harder to get power, and the internet to
transfer data between websites to servers.

3. Google provides free email accounts, including free cloud storage. What does the
consumer of these “free” services provide in exchange?
Google gathers data such as name, age, gender and more. This is stored to preview what
Google may think your interests are so they can get you to use their products more. The
issue with this is hackers can get data leaks and sell your data which may be used
maliciously.

4. What is the General Data Protection Regulation (GDPR)?


General Data Protection Regulation is a policy that makes transferring and processing data
legal and safe. It sets rules on how data can be used to protect from leaks and keep your
personal information safe.

Page | 3

This document is licensed with a Creative Commons Attribution 4.0 International License
5. Can GDPR impact US citizens and US companies? Explain your answer.
Yes. Any company that uses European user data is subject to the GDPR. No matter where
the company takes place, could be US or UK, the GDPR can send fines to companies for
failing to comply with the GDPR.

EXERCISE 3 HOW DOES CYBERSPACE WORK? (WORLD 101 - LESSON 2 &


3)

Please answer the questions below:


1. Find the Internet by the Numbers section. Describe two of the key differences across
populations in worldwide participation on the Internet.
Richer countries tend to use the internet more than poorer countries.
Countries with a larger population and big cities use the internet more than rural countries.

2. What makes up the “cloud” in “cloud computing” (not just how it is transmitted, but
where the data rests)?
The “cloud” stores its data in datacenters located across the world. The data is transmitted
via the FTP.

3. Find the submarine cables map. Examine the map. Write 2 questions that you
wonder about after exploring the landing points and connections on the map. Have
any ideas on how to answer your questions or where to look for more information?

Page | 4

This document is licensed with a Creative Commons Attribution 4.0 International License
I would like to see what the landing spots look like, is it a huge connector or a small
connector? Do countries with less cables connecting them to the rest of the world have
worse wifi or better?

EXERCISE 4 THE GROWING THREAT OFTTCYBERATTACKS (LESSON 9)

Please answer questions below:


1. What was unique about the Stuxnet worm?
The Stuxnet worm was the first malware to cause physical destruction to infected devices

2. What does the Stuxnet case reveal in terms of the resources involved in
cybersecurity, whether offensive or defensive?
The resources that countries have are very advanced and an attack on their tools can shut
down a country's internet usage. Stuxnet attacks the physical devices that important
documents, plans, and personal information is stored in, if the device physically shuts down
it can be very hard to regain those files if they are not backed up. This is very dangerous in
terms that it could seriously harm a users, companies, and even countries data.

EXERCISE 5 SHOULD THE INTERNET RESPECT NATIONAL BORDERS?


(WORLD 101 - LESSON 5)

Instructions: Research the differing perspectives of the US and


China.

Files or Resources that are Needed: Two additional resources are


provided that may be helpful.
● https://www.theatlantic.com/international/archive/2018/06/
zte-huawei-china-trump-trade-cyber/563033/

Page | 5

This document is licensed with a Creative Commons Attribution 4.0 International License
● https://www.theguardian.com/news/2018/jun/29/the-great-
firewall-of-china-xi-jinpings-internet-shutdown

Please answer the questions below:


1. Describe the differing perspectives of the United States and China regarding control
of the Internet. What societal and political values are reflected in these differing
perspectives?
The Chinese government restricts internet access for 2 reasons. One of them is to silence
freedom of speech. Since the USA provides the right to freedom of speech, websites don't
regulate media about politics. This makes China try to avoid traffic to these websites.
Another reason is political power. China also wants to make their government more secure
to countries like the USA. So they limit internet access to limit the spread of these
government secrets.

2. Describe a few examples of how China exerts control over the Internet.
Since China has regulated internet access, they have many rules over their internet. They block popular
websites such as Facebook and Google. They do this by checking packets for sensitive key-words. Another
example. They also regulate the data thats going to websites.

Page | 6

This document is licensed with a Creative Commons Attribution 4.0 International License

You might also like