Criminal Cyber-Security Ch. 3

Course Administration

  • Practical Exercise #1: Students will take apart a computer.

  • Homework #2: Due Monday, Jan. 27.

Lesson Objectives: Cyber Essentials

  • Understand the concept of Binary Truth Tables.

  • Understand the six basic logic gates:

    • AND

    • OR

    • NOT

    • NAND

    • NOR

    • XOR
      Each gate must be understood including their corresponding symbols and truth tables.

  • Understand how mechanical switches and transistors can be used to create these logic gates.

Lesson Objectives: Criminal Justice Applications

  • Understand the term “Hacking” and its historical origins.

  • Understand the Hacking Subculture and its organization, including core values.

  • Recognize various motivations of Hackers.

  • Application of these concepts in reviewing the short film: “414s.”

Binary Logic

  • Binary is crucial not only for storing digital values but also for logical operations.

  • Binary values:

    • 0: represents False.

    • 1: represents True.

    • Electric Current is On = True or 1.

    • No Electric Current = False or 0.

The Transistor as a Switch

  • Functionality of a Transistor:

    • Current In: Determines if the transistor is charged.

    • Current Out:

    • If the Transistor is Charged:

      • Control wire closes the circuit, allowing current to flow out.

    • If not charged, the circuit remains open, and current does not flow out.

BOOLEAN LOGIC and LOGIC GATES

AND Gate


  • Symbol:

    AND Gate symbol

  • Truth Table:

    A

    B

    Output


    0

    0

    0


    0

    1

    0


    1

    0

    0


    1

    1

    1

    OR Gate


    • Symbol:

      OR Gate symbol

    • Truth Table:

      A

      B

      Output


      0

      0

      0


      0

      1

      1


      1

      0

      1


      1

      1

      1

      NOT Gate


      • Symbol:

        NOT Gate symbol

      • Truth Table:

        Input

        Output


        0

        1


        1

        0

        XOR Gate (Exclusive OR)


        • Truth Table:

          Input A

          Input B

          Output


          TRUE

          TRUE

          FALSE


          TRUE

          FALSE

          TRUE


          FALSE

          TRUE

          TRUE


          FALSE

          FALSE

          FALSE

          NAND Gate (NOT AND)


          • Truth Table:

            A

            B

            Output


            0

            0

            1


            0

            1

            1


            1

            0

            1


            1

            1

            0

            NOR Gate (NOT OR)


            • Truth Table:

              A

              B

              Output


              0

              0

              1


              0

              1

              0


              1

              0

              0


              1

              1

              0

              Practical Example of Logic Gates Functionality

              • Reference to Arithmetic & Logic Unit (ALU):
                Demonstrates how various logic gates can solve binary operations and contribute to computation.

              In-Class 5 Minute Break

              • Activities recommended:

                • Stand Up

                • Get Moving

                • Do some stretches or exercises

                • Use the bathroom

                • Talk to a neighbor

              • Avoid: Checking email or phone during the break.

              Cyber and Criminal Justice: Cybercriminal Culture

              • Definition of Hacking:

                • Use of technical know-how to modify a machine or system beyond its intended usage.

              • Community Elements:

                • Creativity

                • Sharing information openly

                • Learning through exploration

                • Pride in achievements

              • Evolution of term “Hacking”:

                • Originally positive; over time, it garnered a negative connotation.

              Organization of Hackers

              • Types of Hacker Groupings:

                • Loners

                • Colleagues

                • Peers

                • Teams

                • Formal Organizations

              Hacker Values

              • Core values within the hacking community include:

                • Appreciation of Technology

                • Knowledge and skill acquisition

                • Commitment to open-source ideals

                • Identity as a hacker

                • Laws and secrecy surrounding hacking practices.

              Hacker Motivations

              • Various motivations driving individuals to hack include:

                • Addiction to the thrill

                • Curiosity related to systems and software

                • Excitement and Entertainment

                • Financial Gains (Money)

                • Power, Status, or Ego associated with hacking success

                • Ideologies driving their actions

                • Peer Recognition and social standing

                • Revenge against systems or individuals

                • Neutralization, a method to rationalize and lessen guilt towards their actions.

              The 414s

              • Reference to the original teenage hackers, highlighting key insights and cultural significance.

              Setup for Future Classes

              • Virtual Machine Setup:

                • Follow the link provided to set up a Raspberry Pi, a simplified computer.

                • In-class walkthroughs will aim to teach the basic functioning of the device.