Criminal Cyber-Security Ch. 3
Course Administration
Practical Exercise #1: Students will take apart a computer.
Homework #2: Due Monday, Jan. 27.
Lesson Objectives: Cyber Essentials
Understand the concept of Binary Truth Tables.
Understand the six basic logic gates:
AND
OR
NOT
NAND
NOR
XOR
Each gate must be understood including their corresponding symbols and truth tables.
Understand how mechanical switches and transistors can be used to create these logic gates.
Lesson Objectives: Criminal Justice Applications
Understand the term “Hacking” and its historical origins.
Understand the Hacking Subculture and its organization, including core values.
Recognize various motivations of Hackers.
Application of these concepts in reviewing the short film: “414s.”
Binary Logic
Binary is crucial not only for storing digital values but also for logical operations.
Binary values:
0: represents False.
1: represents True.
Electric Current is On = True or 1.
No Electric Current = False or 0.
The Transistor as a Switch
Functionality of a Transistor:
Current In: Determines if the transistor is charged.
Current Out:
If the Transistor is Charged:
Control wire closes the circuit, allowing current to flow out.
If not charged, the circuit remains open, and current does not flow out.
BOOLEAN LOGIC and LOGIC GATES
AND Gate
Symbol:
Truth Table:
A
B
Output
0
0
0
0
1
0
1
0
0
1
1
1
OR Gate
Symbol:
Truth Table:
A
B
Output
0
0
0
0
1
1
1
0
1
1
1
1
NOT Gate
Symbol:
Truth Table:
Input
Output
0
1
1
0
XOR Gate (Exclusive OR)
Truth Table:
Input A
Input B
Output
TRUE
TRUE
FALSE
TRUE
FALSE
TRUE
FALSE
TRUE
TRUE
FALSE
FALSE
FALSE
NAND Gate (NOT AND)
Truth Table:
A
B
Output
0
0
1
0
1
1
1
0
1
1
1
0
NOR Gate (NOT OR)
Truth Table:
A
B
Output
0
0
1
0
1
0
1
0
0
1
1
0
Practical Example of Logic Gates Functionality
Reference to Arithmetic & Logic Unit (ALU):
Demonstrates how various logic gates can solve binary operations and contribute to computation.
In-Class 5 Minute Break
Activities recommended:
Stand Up
Get Moving
Do some stretches or exercises
Use the bathroom
Talk to a neighbor
Avoid: Checking email or phone during the break.
Cyber and Criminal Justice: Cybercriminal Culture
Definition of Hacking:
Use of technical know-how to modify a machine or system beyond its intended usage.
Community Elements:
Creativity
Sharing information openly
Learning through exploration
Pride in achievements
Evolution of term “Hacking”:
Originally positive; over time, it garnered a negative connotation.
Organization of Hackers
Types of Hacker Groupings:
Loners
Colleagues
Peers
Teams
Formal Organizations
Hacker Values
Core values within the hacking community include:
Appreciation of Technology
Knowledge and skill acquisition
Commitment to open-source ideals
Identity as a hacker
Laws and secrecy surrounding hacking practices.
Hacker Motivations
Various motivations driving individuals to hack include:
Addiction to the thrill
Curiosity related to systems and software
Excitement and Entertainment
Financial Gains (Money)
Power, Status, or Ego associated with hacking success
Ideologies driving their actions
Peer Recognition and social standing
Revenge against systems or individuals
Neutralization, a method to rationalize and lessen guilt towards their actions.
The 414s
Reference to the original teenage hackers, highlighting key insights and cultural significance.
Setup for Future Classes
Virtual Machine Setup:
Follow the link provided to set up a Raspberry Pi, a simplified computer.
In-class walkthroughs will aim to teach the basic functioning of the device.