Cybersecurity

By 1806268
  • Quiz 1

    Quiz 1
    1.Originally, the term hacker described individuals with advanced programming skills.
    2.Hackers used these programming skills to test the limits and capabilities of early systems.
    3.These early hackers were also involved in the development of early computer games.
  • Quiz 2

    Quiz 2
    1. John McCumber is one of the early cybersecurity experts.
    2. He developed a commonly used framework called the McCumber Cube or the cybersecurity Cube.
    3. The cybersecurity Cube is used as tool when managing the protection of networks, domains and the Internet.
  • Quiz 3

    Quiz 3
    1. A virus is malicious executable code attached to another executable file, such as a legitimate program. Most viruses require end-user initiation, and can activate at a specific time or date.
    2. Worms are malicious code that replicates by independently exploiting vulnerabilities in networks. Can run without a host program.
    3. A Trojan horse is malware that carries out malicious operations under the guise of a desired operation such as playing an online game.
  • Hashing exercise

    An exercise that shows how to use a hash generator to change a file into a 32-digit hash.
  • Hashing algorithm research

    A table in which we put information we found out about three different hash types, MD5, SHA-1 and SHA-2.
  • Kevin Mitnick interview

    We watched an interview Kevin Mitnick had with a Google employee. He spoke about his life as a hacker.
  • Symmetric / asymmetric encryption algorithms

    We researched several encryption algorithms, such as 3DES or RSA.
  • Cipher chart

    We learned about ciphers, and about the cipher wheel.
  • Google data center / security key exercise

    We learned about security keys, something you could get to let you sign in instantly if you have it.
  • Server services

    Ftp: the purpose of ftp is to transfer files between devices.
    Web: the purpose of a web server is to connect devices to the internet.
    Email: the purpose of an email server is to allow users to send messages to each other.
    Dns: the purpose of a dns server is to automatically translate internet addresses to the numeric machine addresses that computers use.
    Ntp: is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.
  • Cyber world lab

    We edited a network in packet tracer, following instructions to learn how to make certain services work.
  • Server services part 2

    Aaa: authentication, authorisation and accounting (AAA) is a system for tracking user activities on an IP-based network and controlling their access to network resources.
  • Lab 2 - Communicating in a cyber world

    I sent files between devices using an ftp server, sent emails using the email service, and remotely accessed an enterprise router using telnet and ssh.
  • Lab 3 - exploring file and data encryption

    I had to decrypt data that I found on packet tracer.
  • Lab 4 - Using File and Data Integrity Checks

    I verified the integrity of files using hashes.