Unauthorized Access Analysis


Topic area Unauthorized Access (Intrusion)
Target audience Computer Science Majors and Minors
Activity type Reading articles provided, filling worksheet, class discussion.
Time required
  • Reading of articles: 30 minutes 
  • Checking out the references: 20 minutes
  • Class discussion: 20 minutes
  • Filling worksheet: 10 minutes
Attachments Worksheet
Articles Provided
  1. "FBI tracks down student who used computer to access government files" Boston Globe and Nando.net, March 30, 1996 http://www.nando.net/newsroom/ntn/info/033096/info1_11416.html
  2. "Judge Refuses Mitnick's Plea to Use Computer " Los Angeles Times, March 31, 1998. http://kevinmitnick.com/archives.html
  3. "Hackers target more federal computers" CNNI, June 1, 1999 

  4. http://www.cnn.com/TECH/computing/9906/01/hackers/index.html
Background needed to complete the assignment Students are to be given articles describing intruders and inrusion. No particular knowledge / skills are needed.
References
  1. "Tripwire(tm) 2.0 for Red Hat Linux Now Free" in http://www.linuxgazette.com/issue40/issue40.html 
  2. http://www.aracnet.com/~gtr/archive/intrusions.html 
  3. http://www.nswc.navy.mil/ISSEC/CID/step.htm
  4. http://www.eff.org/pub/Legal/scda_cracking_investigation.paper
Last modified August 1999

Abstract:

The articles given in the reading assignment discuss two persons who intruded into computers. One of these persons used the intrusion to commit more crimes whereas the other person did it appreantly for no obvious goals. These articles were selected to let the students know how unauthorized access can turn people into criminals. The references show that it is not difficult to detect intrusion due to newer and better methods that are available free. One of the reference articles also shows that intruder can be taken to the court and there is guidance available on how to develop the case against the intruder.

Goals for the activity:

Knowledge / skills / attitudes to be developed (behavioral objectives): Procedure:
  1. Read both articles.
  2. Glance through the references
  3. Participate in the discussion on the subject, that will follow.
  4. Fill the worksheet
Assessing outcomes:
The students will be graded for their participation in this exercise. Inconsistent worksheet responses will be detected and lowered in weight. Participation in class discussion is encouraged and rewarded as extra points.

Additional remarks:
None.

Author contact information:
Junaid Ahmed Zubairi
SUNY College at Fredonia
Fredonia, NY 14063
zubairi@cs.fredonia.edu


Page maintained by: kwb@csee.usf.edu