Explore the tabs across the top of the site

Assignment Help Computer Engineering
Reference no: EM133574246

Homework

Part 1: Explore the HIBP Website

How long has it been since you last heard of a data breach in the news or were perhaps notified that your account had been impacted? Security Magazine reported that in 2021 more than 4,145 publicly disclosed data breaches with 22 billion records exposed occurred. Other reporting indicates the top country for data breaches in the world is the U.S., with over 212 million users (63% of the population) affected (Surfshark, 2022). With data breaches so prevalent and the U.S. subject to the most data breaches of any country, how can the average person become better informed?

Troy Hunt, a noted security researcher, runs the website "Have I Been Pwned?" (HIBP) (pwned as a variant of "owned" CYB 4301, Cybersecurity and Crime 2 meaning taken over, loss of control, utterly defeated, etc.) to help people learn about breaches, determine if emails and domain names have been found in data breaches, and other useful services.

In part one of this homework, you will explore the HIBP website, and perform a self-assessment of your digital footprint.

Question A. Go to the website Have I Been Pwned?. (Have I Been Pwned: Check if your email has been compromised in a data breach)

Question B. Explore the tabs across the top of the site (e.g., Notify me, Domain Search, Who's Been Pwned, Passwords)

Question C. Enter an email address or a phone number you own into the "pwned?" field on the home tab (Do not use someone else's email address nor the email of your employer) and click "pwned?"

Question D. Scroll down the page to the "Breaches you were pwned in," and review the results. Note: If your submission comes back without results, try an alternate address or talk to your instructor.

Question E. Click on the "Notify Me" tab at the top of the page. Review the options available to you.

Question F. Click on the "Domain Search" tab at the top of the page. If you own a personal domain you can enter the information and obtain actual results, but it is not required. Alternatively, review the Blog Post. (Troy Hunt: I'm pwned, you're pwned, we're all pwned - introducing domain wide searches)

Question G. Click on the "Who's Been Pwned" tab at the top of the page. Choose one of the organizations listed that you have an account with, have done business with, or visited their website.

Question H. Click on the "Passwords" tab at the top of the page . Choose one of the Top 25 passwords from the NordPasswebsite (Top 200 Most Common Passwords List | NordPass) and submit using the "pwned?" button.

Question I. Click through the various sub-menus under the "About" tab at the top of the page.

Part 2: Report Your Findings

Report Your Findings worksheet to record your findings.

Question A. What is meant by the word "Pwned" in the HIPB website title?

Question B. Choose one of the "Largest Breaches" listed on the Home tab. What was breached (e.g., consumer financial information, information belonging to children, or information within educational records)? How many records were involved? What was the root cause?

Question C. Without divulging your personal email account, provide a summary of the results. Ensure you include the top three breaches. What breach surprised you and why?

Question D. If you entered a domain you own into the "Domain Search" tab, without disclosing the domain name, provide a synopsis of the results. If you do not own a domain name, provide one or two of the most important points you discovered by reading Troy Hunt's blog post.

Question E. What did you find out about the organization you investigated on the "Who's Been Pwned" tab? What did you find interesting? Will you continue to do maintain your personal account with the organization? Why, or why not?

Question F. What password did you choose from the NordPass list? What results were returned? Are you surprised by the time to crack the password or the frequency count of the password you chose? What is the significance of this research?

Question G. Summarize what you learned about your own digital footprint. What surprised you about you learned from the HIPB website? What are the implications of entering sensitive data into the HIPB website?

Question H. Based on what you have learned from the HIPB website, what business challenges are associated with safeguarding sensitive information? What statutory versus regulatory concerns exist in safeguarding sensitive information?

Reference no: EM133574246

Questions Cloud

What ability when faced with such an unpredictable : The university deftly moved to online classes when COVID-19 hit its campus, thereby demosntrating what ability when faced with such an unpredictable
What is primary diagnosis trichomoniasis herpes gonorrhea : There is a fishy odor on exam. What is your primary diagnosis Trichomoniasis Herpes Gonorrhea Chlamydia/?
Consider the market for land in upstate new york : Consider the market for land in upstate New York, a mostly rural and less populous area, as compared to the market for land in the Upper West Side of New York
How the income tax is designed to achieve multiple goals : Explain how the Income Tax is designed to achieve multiple goals, i.e., social - political - economic - stimulus - incentive - disincentive objectives
Explore the tabs across the top of the site : Explore the tabs across the top of the site. Click on the Notify Me tab at the top of the page. Review the options available to you.
Plumber and while they had independent companies : Jules was a carpenter and Ari was a plumber and while they had independent companies, they were frequently hired to work on the same home.
Fingerprint floors franchise which installed wood flooring : Rio and Lux partnered and purchased for $280,000 a Fingerprint Floors franchise which installed wood flooring, carpeting, and laminates in homes.
Describe the algorithm of conversion of the conceptual model : ICT5151 Data and Information Management, Describe the algorithm of conversion of the Conceptual Model into the Logical Model. Remember that your description
How did anesthetic stop nociceptive signal from tooth : While having lunch right after the visit, soup drips out of the patient's mouth because she has no feeling around her right lower lip.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd