Activities Guide and Evaluation Rubric - Unit 1 - Task 2 - Attacking and Defending
Activities Guide and Evaluation Rubric - Unit 1 - Task 2 - Attacking and Defending
Activities Guide and Evaluation Rubric - Unit 1 - Task 2 - Attacking and Defending
1. Activity Description
Type of activity: Collaborative
Evaluation moment: Intermediate Unit 1
Highest score of the activity: 125 points
The activity starts on: Monday, The activity ends on: Sunday, March 19,
February 20, 2023 2023
With this activity, you are expected to achieve the following learning
outcomes:
Collaborative work:
This section aims to understand the topics required for the development of the activity.
The topics of the unit are:
For this, the collaborative group is organized to consult, address and debate the
following questions:
1
3. What are security controls?
4. Why is it important to implement an information security policy in an
organization?
5. What is the objective of carrying out continuity plans in an organization?
Each student chooses one of the questions mentioned above, the question and the
reasoned answer are documented and published in the activity forum, based on the
readings made and their personal criteria. Additionally, she must make a comment to
at least one response from a colleague, to express her support, complement or
disagreement in a respectful and reasoned way.
It is important to cite the sources that support the opinions in APA 7 format, so that
colleagues can consult them for further information.
Based on the participations made in the forum, the group prepares an online electronic
presentation, presenting the relevant information on the topics developed in the
questions. This structure is the next one:
Slide 1: Cover.
Slide 2,3,4,5 and 6: Thematic development.
Slide 7: References.
Slide 8. Conclusions.
Individual work:
• PART ONE – Defending: Are you aware of the information that anyone can find out
about us without restrictions on the Internet? The objective is to learn to find what
can be known about themselves on the internet, using OSINT tools (Open Source
INTelligence), translated as Open Source Intelligence. It refers to the set of
techniques and tools to collect public information, analyze the data and correlate it,
turning it into useful knowledge.
In Google there are operators with combination capacity that provide us with very
extensive information: intitle, allintitle, inurl, allinurl, filetype, link, inanchor,
daterange, view / indexFrame.shtml, among others. On the other hand, there are a
multitude of metasearch engines and other great sources of information within the
Internet to search for any fingerprint or digital trace.
2
For the development of this activity, you must document and search for yourself,
using the operators mentioned above. Search name, ID in social networks, on web
pages, photos, access cameras, search for documents with password.
Examples:
Intitle: "My webcamXP server!" inurl: ": 8080. (Access a camera).
view / indexFrame.shtml
Servers with files called password.txt: intitle "Index of" "Index of /" password.txt
(Search a directory structure for a Password file)
Robots: site: unir.net inurl: robot.txt
Obtain information from the Metasearch engines mentioned below and attach it to
the individual work. In these search engines include your name (Make the search in
at least three of the mentioned search engines):
www.yasni.es
http://es.kgbpeople.com
https://pipl.com
http://www.spokeo.com
http://webmii.com
Search your Username in the following metasearch engines to see whether or not it
is available on the different social networks:
http://Checkusernames.com
http://namechk.com
http://knowem.com
Finally, it must conclude on what is the criminal capacity of the results obtained in
the exercise.
The student must deliver the document of the individual work with the following
structure:
1. Cover
2. Objectives
3. Part One: OSINT Tools
3.1. Evidence
3.2. To conclude on what is the criminal capacity of the results obtained in the
exercise
4. Part Two: TOR Browser
4.1. Evidence of installation
4.2. Evidence of navigation
4.3. To conclude on the use in the TOR browser from the criminal part and its
consequences
5. Bibliographic references
• Check the course agenda to check the delivery dates of the activity.
• Each student sends a digital document (a Word or PDF document) that contains the
link of the electronic presentation online and with the evidence of their individual
work.
4
The individual evidence to be submitted is:
Please keep in mind that all individual or collaborative written products must comply
with the spelling rules and presentation conditions defined in this activity guide.
Regarding the use of references, consider that the product of this activity must comply
with APA style.
In any case, make sure you comply with the rules and avoid academic plagiarism. You
can review your written products using the Turnitin tool found in the virtual campus.
Under the Academic Code of Conduct, the actions that infringe the academic order,
among others, are the following: paragraph e) Plagiarism is to present as your own
work all or part of a written report, task or document of invention carried out by
another person. It also implies the use of citations or lack of references, or it includes
citations where there is no match between these and the reference and paragraph f)
To reproduce, or copy for profit, educational resources or results of research products,
5
which have rights reserved for the University. (Agreement 029 - 13 de December de
2013, article 99)
6
Form: If your work is at this level, you can get between 4 and 5
Presentation of the points.
collaborative work
document. Medium Level: The presentation does not include references,
is not structured in a totally orderly manner, or is not done in
This criterion online electronic presentation software.
represents 5 If your work is at this level, you can get between 2 and 3
points of the total points.
of 125 points of
the activity. Low level: The presentation is not structured in an organized
way.
If your work is at this level, you can get between 0 points
and 1 point.
Third evaluation High level: Promotes the generation of different points of view
criterion: related to the topic, enriching the discussion and adding value
to it.
Participation If your work is at this level, you can get between 4 and 5
Participation in the points.
forum in
collaborative work. Medium Level: The content of some messages is not coherent
with the subject matter, not all of them are original or they do
This criterion not always promote the generation of different points of view,
represents 5 enriching the discussion and adding value to it.
points of the total If your work is at this level, you can get between 2 and 3
of 125 points of points.
the activity.
Low level: The contents of the messages are not coherent with
the subject matter; they are not original or they do not promote
the generation of different points of view for the discussion and
adding value to it.
7
techniques to
analyze the data. Medium Level: The student partially obtains information about
This criterion themselves through OSINT tools, making use of the operators
represents 30 and the suggested metasearch engines and partially concludes
points of the total on what the criminal capacity of the results obtained in the
of 125 points of exercise is.
the activity. If your work is at this level, you can get between 10 and
20 points.
8
Presentation of the If your work is at this level, you can get between 11 and
independent work 15 points.
document.
Medium Level: The student presents a document in Word or
This criterion PDF with some of the requested elements and includes
represents 15 references in APA format and / or with spelling errors and / or
points of the total good writing.
of 125 points of If your work is at this level, you can get between 6 and
the activity. 10 points.