What to expect
The topic of network security, from the first internet “worm” to sophisticated state-sponsored cyberattacks and everything in between.
When Mary Queen of Scots plotted with Babington to assassinate her sister Queen Elizabeth I she replaced letters and common words with symbols in her messages to him (see Figure 10.2). Sadly for her the Queen’s cryptanalyst (code-breaker) Walsingham knew about frequency analysis and was able to decipher the messages. Despite a distraught Mary proclaiming, “I would never make shipwreck of my soul by conspiring the destruction of my dearest sister”, the decrypted messages and Babington’s confession ensured a guilty verdict and Mary paid the ultimate price in 1587.
Resources mentioned in the chapter:
NCCE resources for this topic including concept map and full teaching materials are here:
Klez, Mydoom viruses etc. https://www.hp.com/us-en/shop/tech-takes/top-ten-worst-computer-viruses-in-history
Cloudflare lava lamps – the story https://blog.cloudflare.com/lavarand-in-production-the-nitty-gritty-technical-details/
Hacking a car through the stereo: https://www.computerworld.com/article/2748225/with-hacking–music-can-take-control-of-your-car.html
SQL Injection resources
Physical Computing ideas
If you have a networked Raspberry Pi you can create a web server with a page that is vulnerable to SQL Injection using these tutorials:
- Setting up a web server on a Raspberry Pi – Raspberry Pi Documentation
- SQL Injection Tutorial: Learn with Example (guru99.com)
Project work – competitions