Spokane Virtual
Cybersecurity
Activity 2.1.1 Confidentiality, Integrity, and Availability
Personal Identifiable Information (PII) is any data from which someone could
reasonably determine the identity of the person associated with that data. PII is an
example of data that must be kept confidential. Would you consider race and gender to
be examples of PII?
No, I don’t necessarily consider race and gender to be examples of PII because race and
gender are personal characteristics rather than direct identifiers. Keep in mind that
these attributes are often collected for statistical or demographic purposes rather than
direct identification. I don’t consider race and gender to be sensitive information.
Activity 2.1.2 Passive Analysis
Work through the following scenario: Suppose you are the victim of a malware attack
and you suspect a spoofed website is the problem. Summarize how each tool could
help you in your investigation of the website.
1.
whois
2.
traceroute
3.
netstat
1.
The “Whois” tool can help me gather information about a domain name, such as
domain register, registration date, and contact details of the domain owner. By
using the “Whois” tool , I can determine if the website is registered to a legitimate
entity or if it is associated with any suspicious activities.
2.
The “traceroute” tool can help me trace the path taken by network packets from
my computer to a target website. By analyzing the route and the IP addresses of
the intermediate network devices, I can identify any suspicious or unexpected
hops.
3.
Netstat is a command-line tool that provides information about network
connections and open ports on my computer. By using Netstat, I can check if there
are any suspicious connections established with the suspected website.
© 2021 Project Lead The Way, Inc.
1