Behavioral Cybersecurity Applications of Personality Psychology and Computer Science, 1e Wayne Patterson
(Solutions Manual All Chapter)
- / 4
1
PROBLEM SOLUTIONS –
BEHAVIORAL CYBERSECURITY
Behavioral Cybersecurity: Chapter Listing
Number Chapter Number of Problems
- Introduction
- What is Cybersecurity? 8
- Essentials of Behavioral Science 3
- Psychology and Cybersecurity 6
- Recent Events 12
- Profiling 9
6 Hack Lab 1: Social Engineering 4
- Access Control 10
8 The First Step: Authorization 10
9 Hack Lab 2: Assigned Passwords in
the Clear 1 10 Origins of Cryptography 8
11 Hack Lab 3: Sweeney Method 3
12 Hacker Personalities: Case Studies 6
13 Game Theory 10 14 Ethical Hacking 7 15 The Psychology of Gender 3 16 Turing tests 9 17 Personality Tests, Methods, and Assessment 2 18 Modular Arithmetic and Other Computational Methods 11 19 Modern Cryptography 6 20 Steganography 3 21 Crypto and Stego 3 22 A Metric to Measure Attacks/Defenses 3 23 Behavioral Economics 3 24 Fake News 4 25 Potpourri 4
26 Hack Lab 4: Password Meters 1
27 Conclusions
TOTAL 149
- / 4
2
- What is Cybersecurity?
Problems All of the sources necessary to answer these questions are available on the Internet if they are not contained in the chapter itself. In particular, the entire book by Stoll can be found online.
- Describe in a paragraph what Fred Cohen proved in his PhD thesis.
Cohen gave the definition of "computer virus".
Cohen is best known for his pioneering work on computer viruses. In 1983, while a student at the University of Southern California's School of Engineering, he wrote a program for a parasitic application that seized control of computer operations, one of the first computer viruses. He wrote a short program, as an experiment, that could "infect" computers, make copies of itself, and spread from one machine to another. It was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk. One of the few solid theoretical results in the study of computer viruses is Cohen's 1987 demonstration that there is no algorithm that can perfectly detect all possible viruses.
- Can you identify the date in the model of the earliest personal computer?
“The first personal computers, introduced in 1975, came as kits: The MITS Altair 8800, followed by the IMSAI 8080, an Altair clone.“In 1976, Apple designed the Apple I, Apple’s only “kit” computer.“In 1977, Apple introduced the Apple II, a color computer with expansion slots and floppy drive support; Radio Shack rolled out the TRS-80; Commodore introduced its PET.”
(http://lowendmac.com/2014/personal-computer-history-the-first-25-years/)
- / 4
3
- Read the Kenneth Thompson Turing Award speech. What is his “chicken and egg”
problem?
Thompson noted that the C compiler is written in the C language. The problem he described as “chicken and egg” occurs when the compiler for a program is written in the language of the program. The specific example arose from the fact that in C, a character string “\n” represents an unprintable character, a newline and not the actual characters \n.
4. In “The Cuckoo’s Egg” by Clifford Stoll, answer the following:
- What was the size of the billing error that led to the beginning of the
- What user was responsible for that billing error and why did it get by?
investigation?75 cents (Cuckoo’s Egg, page 5)
Hunter, and it got by because he didn’t have a valid billing address (Cuckoo’s Egg, page 6)
- Why was Joe Sventek not a suspect?
He was in England, had a glowing reputation, and was so skilled that if he had broken in, he would never leave a trace. (Cuckoo’s Egg, page 7)
- What was the clue that the intruder was coming in from outside the Labs and
not inside?It was known that all persons coming in through dialup had to do so at the rate of 1200 baud. Insiders in the lab could connect at either 9600 or 19,200 baud. Thus it could be determined if the specific line of communication was from the outside or inside. (See page 16.)
- Who was eventually caught and prosecuted?
The West German government finally located the hacker at his home in Hanover. The hacker’s name was Markus Hess, and he had been engaged for some years in selling the results of his hacking to the Soviet KGB.In West Germany's first computer hacker trial, ex-croupier Peter Carl, 35, and two computer wizards were given suspended jail terms of up to two years.
- / 4