Cyber Security 30/09/2021

  • Period: to

    Last session 23/09/2021

    Last lesson we discussed about the technology involved in stages such as Authentication, authorization and then used the Hashing programs MD5 and SHA1 and listed their features and pros and cons. We then looked at the pros and cons services like Sneakernet, Wireless network. Finally, we discussed about IPSEC and its primary protocols.
  • Period: to

    Today 30/09/2021

    Today we analyzed the various threats to a computer system like viruses and provided examples of such whilst explaining how they work. We then gave brief descriptions of methods used by attackers such as Phishing and gave them a rating based on our perspective of how dangerous we thought they were.