Jack Totten - 1.1.2 Cyberspace and Cybersecurity Scavengerhunt Activity
Jack Totten - 1.1.2 Cyberspace and Cybersecurity Scavengerhunt Activity
WHAT IS CYBERSECURITY?
CYBERSPACE AND CYBERSECURITY
CYBERSPACE AND CYBERSECURITY SCAVENGER HUNT
Answers: Questions
MIT and the Department of 1. Name the organizations involved in the
Defense development of Arpanet, the predecessor of
today’s Internet.
Stanford and University of 2. Name the institutions where the first two nodes
California of Arpanet were located in 1969.
Page | 1
This document is licensed with a Creative Commons Attribution 4.0 International License
Robert Tappan Morris created the 4. In 1988, who was responsible for the first
Morris worm solely for analysis malicious internet-based attack?
but it turned malicious.
CompuServe created the first 5. What was significant about CompuServe? You can
commercially used dial up service also watch their commercial
which ended ARPANET https://youtu.be/YfUyR1wlcus.
Tim Burners-Lee of the European 6. Find the year 1991 and read about Tim
Organization for Nuclear Research Berners-Lee. What did he contribute?
(CERN), introduced the world wide
web. To create the WWW he
created the technology behind
Hypernet markup language
(HTML), and the universal
resource locator (URL)
It allows the internet to be able to 7. What distinguishes the Internet from the World
share information instead of just ftp Wide Web?
DARPA project described what 8. In the early 1960’s what was the spirit of the
ARPANET and the internet would DARPA project as envisioned by JCR Licklider?
become.
1. The World Wide Web was 9. The 1990s were a pivotal time for the
made instead of having the development of the Internet. List 3 important
internet be used for file developments from this decade and explain the
transfer, it enables it to be significance of each.
used for so much more for
example, carrying
information.
This document is licensed with a Creative Commons Attribution 4.0 International License
3. URL was created and it is
the only way you can view
websites online.
No one is in charge of the internet, 10. Who is in charge of the Internet?
because the internet is just a set of
protocols, like tcp/ip.
2. Does it matter where (geographic location) your data is stored? Explain your answer.
Yes. Data that's stored in remote areas can be harder to get power, and the internet to
transfer data between websites to servers.
3. Google provides free email accounts, including free cloud storage. What does the
consumer of these “free” services provide in exchange?
Google gathers data such as name, age, gender and more. This is stored to preview what
Google may think your interests are so they can get you to use their products more. The
issue with this is hackers can get data leaks and sell your data which may be used
maliciously.
Page | 3
This document is licensed with a Creative Commons Attribution 4.0 International License
5. Can GDPR impact US citizens and US companies? Explain your answer.
Yes. Any company that uses European user data is subject to the GDPR. No matter where
the company takes place, could be US or UK, the GDPR can send fines to companies for
failing to comply with the GDPR.
2. What makes up the “cloud” in “cloud computing” (not just how it is transmitted, but
where the data rests)?
The “cloud” stores its data in datacenters located across the world. The data is transmitted
via the FTP.
3. Find the submarine cables map. Examine the map. Write 2 questions that you
wonder about after exploring the landing points and connections on the map. Have
any ideas on how to answer your questions or where to look for more information?
Page | 4
This document is licensed with a Creative Commons Attribution 4.0 International License
I would like to see what the landing spots look like, is it a huge connector or a small
connector? Do countries with less cables connecting them to the rest of the world have
worse wifi or better?
2. What does the Stuxnet case reveal in terms of the resources involved in
cybersecurity, whether offensive or defensive?
The resources that countries have are very advanced and an attack on their tools can shut
down a country's internet usage. Stuxnet attacks the physical devices that important
documents, plans, and personal information is stored in, if the device physically shuts down
it can be very hard to regain those files if they are not backed up. This is very dangerous in
terms that it could seriously harm a users, companies, and even countries data.
Page | 5
This document is licensed with a Creative Commons Attribution 4.0 International License
● https://www.theguardian.com/news/2018/jun/29/the-great-
firewall-of-china-xi-jinpings-internet-shutdown
2. Describe a few examples of how China exerts control over the Internet.
Since China has regulated internet access, they have many rules over their internet. They block popular
websites such as Facebook and Google. They do this by checking packets for sensitive key-words. Another
example. They also regulate the data thats going to websites.
Page | 6
This document is licensed with a Creative Commons Attribution 4.0 International License