The goal is to study the methods of cryptographic
information protection used to solve various
problems of the professional field.
Task 1. Study of various encryption methods:
replacement method, Cardano method, permutation
method.
Task 2. Creating hash functions.
Task 3. Steganography: hiding data in graphics
and music files. QR codes.
Examples of control tasks and cases
How can you build a comfortable and secure work
at the workstation: protection against unauthorized
access with a computer left unattended?
Ensuring the safety of information in application
packages (for example, MS Office) in the event of a
failure.
Protection against unauthorized access to files
stored on the hard disk when: differentiating access
between different users; the inability to differentiate
access between different users.
The user constantly uses media from various
places, while: the user's computer is not connected to
the Internet; the user's computer is connected to the
Internet.
Using three different methods of hiding
information, encrypt the message "Information is the
queen of the world".
The flash drive is infected with malware that
leaves only shortcuts to folders available. After the
antivirus program was running, the shortcuts were
removed. Describe the recovery procedure in any
way.
You mistakenly deleted the files you needed, and
the trash was also emptied. How can you restore files?
Describe the recovery procedure in any way.
Describe the low-level formatting procedure.
What is it for?
Describe the different ways to delete a file from
your computer, without using specialized software,
what is the special feature of each?
Describe the mechanism for deleting a file from
the computer at the machine level.
Describe the steganographic methods of hiding
information in a computer image: exif, geo-tag,
archive, watermarks.
Learning tasks (cases), other practice-oriented
forms of assignments
It is known that the manager of the company Alina
has a personal email account, and that she uses social
networks (Vkontakte, Odnoklassniki, Facebook,
etc.). At the same time, she closes the browser
without pressing the "exit" button, uses Internet
Explorer, has 1-2 simple passwords for all resources,
goes online mainly from the workplace sometimes
from home, all social networks are linked to one
email box.
Identify risks related to information security
aspects: integrity, availability and confidentiality.
Formulate recommendations for Alina on
protection against information security threats.
Ekaterina received an email with the following
message: "Hello, Vladimir! You have made a request
to restore the data of the electronic wallet
"WebMoneySet". Your username: vladimir1986.
Your password:236834vm. To manage your account,
install the plugin for making money transactions in
the attachment". The *exe file is attached to the email.
What actions should Catherine take in this
situation?
Is there any method(s) of psychological influence
used in this situation? If so, which one? Explain your
point of view.
George has more than three years of experience in
the IT industry, he is now looking for a job and has
posted his resume on several Internet services. After
some time, he was contacted by A.A. Svetlov, who
introduced himself as an HR manager of "Infosoft".
To decide whether to invite George for an interview
or not, the employer wants to test his skills with
mobile programs. A.A. Svetlov offers to download a
special program from the link and demonstrate your
skills. George downloads the application, performs
the task of the employer, but he is not invited to the
interview. After some time, it turns out that the
malware allowed the attackers to take possession of
George's funds from an account linked to a mobile
bank.
1. What errors can be identified in the information
behavior of George?
2. How to act in this situation?
3. How to avoid similar situations later?
4 COURSE COMPLETION
RESULTS
In the process of the course students were asked to
study the specialized software tools and resources to
simplify the procedures for protecting private
information from unauthorized access, loss and
leakage. The listeners got acquainted with the
resources for checking personal data-leaks of
passwords, logins. We mastered the resources and
programs for creating strong passwords and storing
them. We studied the features of deleting information
using standard OS tools and special programs, and the
key characteristics of these procedures.
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security