Cyber Security Timeline

By SH2002
  • Cyber Security Quiz 1

    1. BYOD means bring your own device
    2. Vulnerability a weakness that makes a target susceptible to an attack
    3. LinkedIn is a example of an Internet data domain?
  • Cyber Security Quiz 2

    1. something you know can be used to verify data
    2. something you are can be used to verify your data
    3. MD5 is a common hash function
  • Cyber Security Quiz 3

    1. The term logic bomb means a malicious program that uses a trigger to awaken the malicious code. 2.Worms self-replicate but viruses do not. 3.backdoor is a name given to a program that bypasses normal authentication.
  • Hashing Algorithm Research

    I completed this on Tuesday, 9 February 2021.
    1. MD5 hash generator
    2. SHA1
    3. Hash
  • File Hashing Exercise

    1. HashCalc works out text files hash keys.
    2. longer hashes provide better security 3.
  • 1.5.3.6 Packet tracer

    1. FTP wasn't built to be secure.
    2. Telnet is an insecure protocol.
    3. SSH is a secure protocol.
  • Google Data Centre work

    1. Two step authentication is a boost to the normal password people keep. 2.A security key login is your specific key which is registered to your google account. 3.Data can be also found in your laptop, computer, mobile phone and other local devices.
  • 1st Cipher Chart from lesson practical

    1. encrypt
    2. decrypt
    3. ciphertext
  • Comparison between Symmetric and Asymmetric Algorithms

    1. IDEA considered to be very secure
    2. AES got replaced by IDEA
    3. AES can have 128, 192 and 256-bits key lengths
  • Mitnick interview

    1. Hacker
    2. On the run
    3. Untraceable
  • Kevin Mitnick interview

    1. hacker
    2. wanted
    3. did the impossible
  • Symmetric/Asymmetric Examples

    1. IDEA is one of the best publicly known algorithms.
    2. AES can have 128, 192 and 256-bits key lengths.
    3. ElGamal communicates between two parties and encrypts the message.
  • 1.5.3.5 Packet Tracer - Creating a Cyber World Lab 1

    1. FTP
    2. server config
    3. computer network configuration
  • Lab 2 1.5.3.6

    1.Configuring the FTP server makes it so that you can transfer and upload files using a server
    2.The web server is a configuration file on the web server machine
    3.Configuring the Email server you can make the emails on the network function correctly
    4.DNS server translates web addresses to machine friendly IP addresses
    5.NTP server synchronizes computer clock times on a network
    6.AAA lets you track the services that users are accessing and the amount of network resources that they are using
  • Packet tracer Lab 3 2.5.2.6

    1. ftp
    2. network
    3. Email
  • Packet tracer Lab 3 2.5.2.7

    1.HTTP
    2.Hashing
    3.Text Editing
  • 3.3.2.7 packet tracer

    1.wpa2 psk security
    2.wpa2 radius
    3. wep is weak