You are here: Computer Attacks and Prevention > Subtopic 3 > Activities

Subtopic 3: Activities

Activity 3.1

Domain Name Servers are an integral part of the workings of the Internet. This activity will allow the student to research and document how DNS work.

Student Procedure

Research how Domain Name Servers are able to match and track domain names with IP addresses. Write a short synopsis of this process.

Instructor Information

Activity level of difficulty: Beginner
Suggested teaching strategies: While this activity requires students to do further research on their own, the subject is well documented and simple. Instructors could identify resources for students to use while performing this activity.
Assessment: Instructors should assess student success based on the quality of research performed and conclusions drawn. Possible topics students should include are:

  • Domain Name Servers maintain databases that match names with actual IP addresses.
  • There are many DNS.
  • DNS cache their databases and periodically refresh themselves.

Activity 3.2

This activity will familiarize students with real world cases involving spoofing attacks. Students will perform research, analyze their findings, and present their conclusions.

Student Procedure

Research online to find an example of a company that was a victim of a spoofing attack.
Write a brief synopsis of the event and its repercussions.

Instructor Information

Activity level of difficulty: Beginner
Suggested teaching strategies: Instructor could suggest current examples for students to research.
Assessment: Instructors should assess student success based on the quality of research performed and the timeliness of the case chosen.

Activity 3.3

There are many types of attacks using the Internet. New methods arise almost daily. Students will be required to educate themselves about these new attacks throughout their careers. This activity will allow the student to research and document one of the most common types - Phishing.

Student Procedure

Research the term "Phishing."
Explain this type of attack and how it is different from spoofing and social engineering.

Instructor Information

Activity level of difficulty: Intermediate
Suggested teaching strategies: This activity requires students to do further research on their own. Instructors could identify resources for students to use while performing this activity.
Assessment: Instructors should assess student success based on the quality of research performed and conclusions drawn. Possible topics students should include are:

  • Phishing is often done with fraudulent emails.
  • Phishing may be done by directing individuals to official looking websites.
  • Phishing schemes will require users to provide sensitive information themselves.
  • Phishing can be countered by training.