diff --git a/README.md b/README.md index bcdc73c..d5209b9 100644 --- a/README.md +++ b/README.md @@ -2,3 +2,13 @@ **ICT Security Basics - from Trust to Blockchain** A course taught at Haaga-Helia University of Applied Sciences by Dr. Tero Karvinen in the fall of 2024. + +## Course description + +Course description can be found at the courses website [Trust to Blockchain 2024](https://terokarvinen.com/trust-to-blockchain/) + +## Course assignments + +- [h0 Hello](https://github.com/TatuE/Trust_to_Blockchain_2024/blob/main/h0_hello.md) +- [h1 Adversarial mindset](https://github.com/TatuE/Trust_to_Blockchain_2024/blob/main/h1_Adversarial_mindset.md) + diff --git a/h0_hello.md b/h0_hello.md index 625fbae..e23a5a5 100644 --- a/h0_hello.md +++ b/h0_hello.md @@ -2,17 +2,14 @@ ## Assignment -This exercise is the first, easy step towards version control systems. Even though you're just clicking buttons on the website, it uses world leading tool git in the background. Git even uses a tree of hashes of blocks, just like Bitcoin. - -- Create a web page using Github. Return it to Laksu, and cross evaluate two. - -### Tips - -- Read this first: Karvinen 2023: Create a Web Page Using Github -- Write the page in Markdown. Add headings and paragraphs. -- Browse to the page where you can see your new page normally (headings in bigger text than paragraphs). The correct link to return is shown in your browsers address bar. -- Remember to use md suffix, so that the website knows it's Markdown. E.g. "tero.md". -- Normally, the cross evaluation has free form feedback: good, bad, ideas for improvement, tips... But for this h0, there is not much to comment and one sentence is enough. If you can see a page with paragraph and heading, it's a five. (For the rest of the course, in feedback for actual homework (h1, h2...), your classmates will surely appreciate longer and insightful feedback). +>This exercise is the first, easy step towards version control systems. Even though you're just clicking buttons on the website, it uses world leading tool git in the background. Git even uses a tree of hashes of blocks, just like Bitcoin. +>- Create a web page using Github. Return it to Laksu, and cross evaluate two. +>### Tips +>- Read this first: Karvinen 2023: Create a Web Page Using Github +>- Write the page in Markdown. Add headings and paragraphs. +>- Browse to the page where you can see your new page normally (headings in bigger text than paragraphs). The correct link to return is shown in your browsers address bar. +>- Remember to use md suffix, so that the website knows it's Markdown. E.g. "tero.md". +>- Normally, the cross evaluation has free form feedback: good, bad, ideas for improvement, tips... But for this h0, there is not much to comment and one sentence is enough. If you can see a page with paragraph and heading, it's a five. (For the rest of the course, in feedback for actual homework (h1, h2...), your classmates will surely appreciate longer and insightful feedback). ## Assignment answer diff --git a/h1_Adversarial_mindset.md b/h1_Adversarial_mindset.md new file mode 100644 index 0000000..bcbe984 --- /dev/null +++ b/h1_Adversarial_mindset.md @@ -0,0 +1,49 @@ +# h1 Adversarial mindset + +>*You will read the famous cyber kill chain paper. And start your very own hacking lab by installing Linux virtual machine.* +>*You can only start this homework after accepting course rules in Moodle.* + +## Assignment + +>x) Read and summarize. Some bullets is enough for a summary. +>- Hutchins et al 2011: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains +>- Darknet Diaries. Pick one episode. (RSS feed) +>- MITRE ATT&CK FAQ explains the ATT&CK Enterprise Matrix. Explain "tactic", "technique" and "procedure" in context of ATT&CK, and give an example of each. The enterprise matrix is big, you can just glimpse/browse it to see what's available instead of reading hundreds of pages. + +>a) How would you compare Cyber Kill Chain and ATT&CK Enterprise matrix? Who do you think could benefit from these models? + +>b) Pick a security incident and learn about it. Write briefly about it. Point out the concepts of threat actor, exploit, vulnerability and (business) impact. (You can find writeups about security incidents from Darknet Diaries and Krebs) + +>c) Install Debian on Virtualbox. Report your work, including the environment (including host OS, the real physical computer used), the steps you took and their results. + +>d) Voluntary bonus: Use either (Hutchins et al 2011) cyber kill chain or MITRE ATT&CK framework for analyzing a security incident. You can pick any incident you want (even the one you used earlier in this homework), but try to pick a source that gives you enough technical and business detail to do some analysis. (If you're in a hurry, cyber kill chain is much simpler. If you're technically skillful, you might find ATT&CK interesting) + +>e) Voluntary bonus: What do you consider the fundamentals of security? What are the theoretical foundations you would teach on the first day? + +>f) Voluntary bonus: Do you think anything is missing from these models, Cyber Kill Chain or MITRE ATT&CK? + +>### Tips: +>- Some bullets for each article is enough. You don't need to have all content of the long articles in your summary. +>- For the summary, add your own question, idea or comment +>- Hutchins et. al. is the cyber kill chain paper. +>- Darknet diaries: you'll probably have a different episode from everyone else, as long as you don't take the latest episode. +>- To listen to podcasts on Android, you can use AntennaPod from F-Droid or Google Play +>- Refer to each source you've used: the course, the task given, the papers, the podcasts - all sources you've used. All sources must be mentioned in every document, page or blog using them. It's enough to just name and link them, you don't need to write another list in the end. In fact, it's imporant to know wich information comes from which source. +>- My article Install Debian on Virtualbox explains it pretty well. +>- Got stuck with VirtualBox or Linux? Don't worry, computers are like that. Write a detailed report (in your homework) with screenshots. Explain what approaches you took and what happened. List where you found advice or articles. Explain your ideas why it would not work. You'll get help and advise in the class (and that's not all - you'll also get Linux on your virtual machine). + +## Assignment answers + +### x + +### a + +### b + +### c + +### d + +### e + +### f \ No newline at end of file