-
This was the first of the weekly cyber security quizzes.
Mark: 81.00 / 100.00- Answered all but one question well, which was an incorrect choice on "What information is used to thwart cyber criminals".
- All other questions answered correct.
-
This was the second of the weekly quizzes.
Mark: 63.33 / 100.00- Majority of the questions were answered correctly.
- Main wrong answers were on multiple choice.
- Hashing Functions, Data Integrity, and Design Principles were some of the answers I got wrong (multiple choice).
-
This was the third of the weekly quizzes. Mark: 63.89 / 100.00 Things I got wrong throughout:
- Injection
-
Not graded yet.
- Learnt the basic fundamentals of hashing.
- Created example hashes.
- Decrypted the example hashes I made.
-
Not graded yet.
- Learnt about ceaser cipher, and what it was used for primarily in the past.
- Learnt about vigenere cipher and its uses.
- Created charts for both encryption methods and learnt what keys are.
-
Not graded yet.
- Learnt about the security procedures google have in place to protect their company and users.
- Learnt about the way google destroys/recycles old/faulty hardware.
- Learnt further about googles two factor authentication.
-
Within this cyber security lab we completed the following tasks in Packet Tracer. I achieved full marks on all sections.
- Configure the FTP Server
- Configure the Web Server
- Configure the Email Server
- Configure the DNS Server
- Configure the NTP Server
- Configure the AAA Server
-
- The FTP server allows you to upload/download files from an external server, as well as store them in a remote location.
- The Web server allows you to host website files to be accessed on the WWW (World Wide Web).
- The Email server allows you to send/receive emails from internal and external sources.
- The DNS server manages the internal structure of the network it's apart of, this can be used to resolve FQDN's and host names.
-
Within this cyber security lab we completed tasks relating to insecure/secure protocols. We also retrieved information which was gathered using a hacker's sniffing tool from the insecure protocols which we used within the network. Below are some of the things I did within this lab:
- Send email between users.
- Upload and download files using FTP.
- Remotely access an enterprise router using telnet.
- Remotely access an enterprise router using SSH.
-
Objectives Part 1: Locate the FTP Account Credentials for Mary’s Laptop Part 2: Upload Confidential Data using FTP Part 3: Locate the FTP Account Credentials for Bob’s PC Part 4: Download Confidential Data using FTP Part 5: Decrypt the Contents of the clientinfo.txt File