1 of 31

To do: April 13

  • 5th period - find your new table
  • Digital Portfolio - now worth 5 points - final deadline next MONDAY, 4/18 (to be able to earn full credit)
    • 4th: Rediet (all), Daniel (PC and WR), Ellie (WR), Achilles (all), Hilario (PC and WR), Rahwa (WR), Lilac (WR)

2 of 31

Safe Computing MC Practice #1: A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?

A) Calling the bank at its official phone number to ask whether the request for personal information is legitimate

B) Calling the phone number given in the e-mail and providing the personal information over the phone

C) Checking that the domain name of the sender’s e-mail address is associated with the bank

D) Conducting a Web search to see if other people have received similar requests for personal information

3 of 31

Safe Computing MC Practice #1: A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?

A) Calling the bank at its official phone number to ask whether the request for personal information is legitimate

B) Calling the phone number given in the e-mail and providing the personal information over the phone

C) Checking that the domain name of the sender’s e-mail address is associated with the bank

D) Conducting a Web search to see if other people have received similar requests for personal information

4 of 31

Safe Computing MC Practice #2: Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A) A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.

B) A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user’s account.

C) A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user’s log-in information for multiple systems may be compromised.

D) A user receives an e-mail that claims to be from the user’s bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user’s username and password were stolen.

5 of 31

Safe Computing MC Practice #2: Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A) A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user’s computer using the recorded data.

B) A user has a very common password for an online banking account. Someone else guesses the password after a few attempts and gains access to the user’s account.

C) A user logs into an unsecure Web site. Someone else is able to view unencrypted log-in information as it is transmitted over the Internet. The user has the same username and password for multiple accounts, so the user’s log-in information for multiple systems may be compromised.

D) A user receives an e-mail that claims to be from the user’s bank. The e-mail instructs the user to click on a link to a Web site and enter a username and password to verify an account. Shortly after following the steps, the user discovers that the Web site is fraudulent and that the user’s username and password were stolen.

6 of 31

Safe Computing MC Practice #3: A user purchased a new smart home device with embedded software and connected the device to a home network. The user then registered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device?

A) A vulnerability in the device’s software is exploited to gain unauthorized access to other devices on the user’s home network.

B) A vulnerability in the device’s software is exploited to install software that reveals the user’s password to an unauthorized individual.

C) The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.

D) The user’s account is sent an overwhelming number of messages in an attempt to disrupt service on the user’s home network.

7 of 31

Safe Computing MC Practice #3: A user purchased a new smart home device with embedded software and connected the device to a home network. The user then registered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device?

A) A vulnerability in the device’s software is exploited to gain unauthorized access to other devices on the user’s home network.

B) A vulnerability in the device’s software is exploited to install software that reveals the user’s password to an unauthorized individual.

C) The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.

D) The user’s account is sent an overwhelming number of messages in an attempt to disrupt service on the user’s home network.

8 of 31

Cybersecurity risks in today's news

Ukraine Says It Thwarted a Sophisticated Russian Cyberattack on Its Power Grid

Link to article

9 of 31

10 of 31

11 of 31

Unit 10 Lesson 7 - Wrap Up

Let's Play: Team mode with your table partner - groups of 2 or 3

12 of 31

AP CS Principles AP Exam: Section 1 MC

  • 70 Multiple-Choice Questions
    • 57 single-select multiple-choice
    • 5 single-select with reading passage about a computing innovation
    • 8 multiple-select multiple-choice: select 2 answers
  • 120 Minutes
  • 70% of Score

13 of 31

Go over homework:

  • Write 7 Unit 10 key words and definitions in IN glossary
  • goFormative - Call center reading passage #1-6
    • Write notes for each question #1-5 in IN.
    • #6 - upload a photo of your work in your IN

14 of 31

Do This: This message was encrypted using a Caesar Cipher (an "alphabetic shift"). Let's see how long it takes you to decode this message (remember it's just a shifting of the alphabet)

serr cvmmn va gur pnsrgrevn

Unit 10 Lesson 9 - Warm Up

Key: ?

a b c d e f g h i j k l m n o p q r s t u v w x y z

15 of 31

Do This: This message was encrypted using a Caesar Cipher (an "alphabetic shift"). Let's see how long it takes you to decode this message (remember it's just a shifting of the alphabet)

serr cvmmn va gur pnsrgrevn

Unit 10 Lesson 9 - Warm Up

Key: change every letter by 13

free pizza in the cafeteria

a b c d e f g h i j k l m n o p q r s t u v w x y z

16 of 31

Caesar Cipher

Unit 10 Lesson 9 - Activity

Do This:

  • Go to U10L09 bubble 1.
  • Experiment with the tool: click things, figure out what it's doing
  • Choose one of the messages from the drop-down menu - what is the encrypted message?

17 of 31

Unit 10 Lesson 9

KEY WORDS:

Encryption: a process of encoding messages to keep them secret, so only "authorized" parties can read it.

Decryption: a process that reverses encryption, taking a secret message and reproducing the original plain text.

Cipher: the generic term for a technique (or algorithm) that performs encryption

Symmetric Key Encryption: involves one key for both encryption and decryption.

18 of 31

Unit 10 Lesson 9

KEY WORDS:

Caesar's Cipher: a technique for encryption that shifts the alphabet by some number of characters.

Cracking encryption: When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

19 of 31

Caesar Cipher -> Symmetric encryption

  • The Caesar Cipher is an encryption algorithm that involves shifting the alphabet
  • The number of letter shifts is used to encode and decode the message is the key

When you are cracking the Caesar Cipher you are trying to figure out how many steps each letter was shifted - you are trying to discover the key.

20 of 31

Random Substitution Cipher

Unit 10 Lesson 9 - Activity

Do This:

  • Navigate to bubble 2
  • Experiment with the tool: click things, figure out what it's doing
  • What do you notice about this widget?

21 of 31

Random Substitution Cipher

Unit 10 Lesson 9 - Activity

Do This: Crack a message using the tips we just talked about

  • Find the short words and "crack" them first. How many one-letter words do you know? ("a"). A very common 3-letter word is "the".
  • Once you've done that, you have substitutes for some of the most common letters. You should be able to use intuition to look at other words with these partial substitutions and make good guesses.
  • After finding only a handful of hard-fought letters, the rest will tumble quickly.
  • Comparing the frequencies of letters gives good insight for making sensible guesses.

22 of 31

Random Substitution Cipher -> Symmetric Encryption

If random substitution is an algorithm for encryption, what is the key to a random substitution cipher?

23 of 31

Random Substitution Cipher -> Symmetric Encryption

If random substitution is an algorithm for encryption, what is the key to a random substitution cipher?

The key is the actual letter-to-letter mapping that was used to encode the message - it can also be used to decrypt the message.

24 of 31

What makes encryption strong?

  • In encryption you should always assume that your 'enemy' knows the encryption algorithm and has access to the same tools that you do.
  • What makes encryption REALLY strong is making it hard to guess or crack the “key,” even if the “enemy” knows the encryption technique you're using.

25 of 31

The Enigma machine

26 of 31

The Enigma machine

A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case. The Enigma machine is more complex but is still fundamentally a polyalphabetic substitution cipher.

27 of 31

Vigenère Cipher Recap

  • Vigenere is strong because looking at the cipher text there are no discernable patterns assuming a good key was chosen.
  • Because the ciphertext is resistant to analysis it leaves us simply having to guess what the key is.
  • Even if we know the length of the key we might still have to try every possible letter combination which is a prohibitively large number of possibilities.

28 of 31

Vigenère Cipher Recap

For a long time, the Vigenère cipher was considered to be an unbreakable cipher and was used by governments to send important messages.

But in the 1800s Vigenere was discovered to be susceptible to a modified form of frequency analysis. After that point it was considered insecure. Still the properties of Vigenere that we've found are desirable.

29 of 31

Unit 10 Lesson 9 - Wrap Up

KEY WORDS:

Encryption: a process of encoding messages to keep them secret, so only "authorized" parties can read it.

Decryption: a process that reverses encryption, taking a secret message and reproducing the original plain text.

Cipher: the generic term for a technique (or algorithm) that performs encryption

Symmetric Key Encryption: involves one key for both encryption and decryption.

30 of 31

Unit 10 Lesson 9 - Wrap Up

KEY WORDS:

Caesar's Cipher: a technique for encryption that shifts the alphabet by some number of characters.

Cracking encryption: When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

31 of 31

Homework

  • Write 6 Unit 10 key words in IN glossary - encryption, decryption, symmetric key encryption, Caesar cipher, cracking encryption
  • Submit screenshot of your best effort (10 minutes is sufficient!) to crack U10L09 bubble 2 - random substitution cipher