Explore the tabs across the top of the site

Assignment Help Computer Engineering
Reference no: EM133574246

Homework

Part 1: Explore the HIBP Website

How long has it been since you last heard of a data breach in the news or were perhaps notified that your account had been impacted? Security Magazine reported that in 2021 more than 4,145 publicly disclosed data breaches with 22 billion records exposed occurred. Other reporting indicates the top country for data breaches in the world is the U.S., with over 212 million users (63% of the population) affected (Surfshark, 2022). With data breaches so prevalent and the U.S. subject to the most data breaches of any country, how can the average person become better informed?

Troy Hunt, a noted security researcher, runs the website "Have I Been Pwned?" (HIBP) (pwned as a variant of "owned" CYB 4301, Cybersecurity and Crime 2 meaning taken over, loss of control, utterly defeated, etc.) to help people learn about breaches, determine if emails and domain names have been found in data breaches, and other useful services.

In part one of this homework, you will explore the HIBP website, and perform a self-assessment of your digital footprint.

Question A. Go to the website Have I Been Pwned?. (Have I Been Pwned: Check if your email has been compromised in a data breach)

Question B. Explore the tabs across the top of the site (e.g., Notify me, Domain Search, Who's Been Pwned, Passwords)

Question C. Enter an email address or a phone number you own into the "pwned?" field on the home tab (Do not use someone else's email address nor the email of your employer) and click "pwned?"

Question D. Scroll down the page to the "Breaches you were pwned in," and review the results. Note: If your submission comes back without results, try an alternate address or talk to your instructor.

Question E. Click on the "Notify Me" tab at the top of the page. Review the options available to you.

Question F. Click on the "Domain Search" tab at the top of the page. If you own a personal domain you can enter the information and obtain actual results, but it is not required. Alternatively, review the Blog Post. (Troy Hunt: I'm pwned, you're pwned, we're all pwned - introducing domain wide searches)

Question G. Click on the "Who's Been Pwned" tab at the top of the page. Choose one of the organizations listed that you have an account with, have done business with, or visited their website.

Question H. Click on the "Passwords" tab at the top of the page . Choose one of the Top 25 passwords from the NordPasswebsite (Top 200 Most Common Passwords List | NordPass) and submit using the "pwned?" button.

Question I. Click through the various sub-menus under the "About" tab at the top of the page.

Part 2: Report Your Findings

Report Your Findings worksheet to record your findings.

Question A. What is meant by the word "Pwned" in the HIPB website title?

Question B. Choose one of the "Largest Breaches" listed on the Home tab. What was breached (e.g., consumer financial information, information belonging to children, or information within educational records)? How many records were involved? What was the root cause?

Question C. Without divulging your personal email account, provide a summary of the results. Ensure you include the top three breaches. What breach surprised you and why?

Question D. If you entered a domain you own into the "Domain Search" tab, without disclosing the domain name, provide a synopsis of the results. If you do not own a domain name, provide one or two of the most important points you discovered by reading Troy Hunt's blog post.

Question E. What did you find out about the organization you investigated on the "Who's Been Pwned" tab? What did you find interesting? Will you continue to do maintain your personal account with the organization? Why, or why not?

Question F. What password did you choose from the NordPass list? What results were returned? Are you surprised by the time to crack the password or the frequency count of the password you chose? What is the significance of this research?

Question G. Summarize what you learned about your own digital footprint. What surprised you about you learned from the HIPB website? What are the implications of entering sensitive data into the HIPB website?

Question H. Based on what you have learned from the HIPB website, what business challenges are associated with safeguarding sensitive information? What statutory versus regulatory concerns exist in safeguarding sensitive information?

Reference no: EM133574246

Questions Cloud

What ability when faced with such an unpredictable : The university deftly moved to online classes when COVID-19 hit its campus, thereby demosntrating what ability when faced with such an unpredictable
What is primary diagnosis trichomoniasis herpes gonorrhea : There is a fishy odor on exam. What is your primary diagnosis Trichomoniasis Herpes Gonorrhea Chlamydia/?
Consider the market for land in upstate new york : Consider the market for land in upstate New York, a mostly rural and less populous area, as compared to the market for land in the Upper West Side of New York
How the income tax is designed to achieve multiple goals : Explain how the Income Tax is designed to achieve multiple goals, i.e., social - political - economic - stimulus - incentive - disincentive objectives
Explore the tabs across the top of the site : Explore the tabs across the top of the site. Click on the Notify Me tab at the top of the page. Review the options available to you.
Plumber and while they had independent companies : Jules was a carpenter and Ari was a plumber and while they had independent companies, they were frequently hired to work on the same home.
Fingerprint floors franchise which installed wood flooring : Rio and Lux partnered and purchased for $280,000 a Fingerprint Floors franchise which installed wood flooring, carpeting, and laminates in homes.
Describe the algorithm of conversion of the conceptual model : ICT5151 Data and Information Management, Describe the algorithm of conversion of the Conceptual Model into the Logical Model. Remember that your description
How did anesthetic stop nociceptive signal from tooth : While having lunch right after the visit, soup drips out of the patient's mouth because she has no feeling around her right lower lip.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Develop both in android and ios platforms

Modify prototype 1 for a user who is involved in trading currencies based on the trend of several exchange rate of a particular currency in the hope.

  What are the process improvement strategies

Conclude your presentation by providing recommendations for process improvement strategies for your selected Performance Check and Proficiency Testing.

  How have the crime trends been over a period of time

Which locations are more prone to different kinds of crimes? Why? How have the crime trends been over a period of time?

  Write down a class grade with a method getnumericgrade

note down  a Java program that translates a letter grade into a number grade. Letter grades are A B C D F, possibly followed by + or -. Their numeric values are 4, 3, 2, 1, and 0. There is no F+ or F-. A + increases the numeric value by 0.3, a - d..

  Pros and cons of chen and crow''s feet notations

What are the pros and cons of Chen and Crow's feet notations.

  How would you verify if the tool is reliable enough

CYBR 420 Bellevue University How would you verify if the tool is reliable enough that its output could be introduced as evidence in court or an administrative

  Explain the core beliefs of the just-in-time philosophy

Explain the core beliefs of the just-in-time (JIT) philosophy. Explain the elements of total quality management (TGM) and their role in JIT.

  Explain the use of microsoft baseline security analyzer

Your draft guidance will explain the use of Windows Defender and Microsoft Baseline Security Analyzer and then describe how each could be used as part of an inc

  Explain the phases of the project management process

Briefly summarize the project management process. Explain which of the four phases of the project management process you think is most challenging and how you.

  Reduce to a minimum sum of products

Reduce to a minimum sum of products (A XOR BC) + BD + ACD - Reduce to a minimum product of sums

  Comment on your observations in a statement

Analytically convert this ordinary differential equation into an equivalent system of coupled first order ordinary differential equations.

  Why the e-mail has become a critical component

With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Please identify and clearly state what.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd