CyberSecurity

By Hafsa.H
  • CyberSecurity Quiz 1

    1. Cybersecurity Domains
    2. Cybersecurity Criminals
    3. Cybersecurity Specialists
  • CyberSecurity Quiz 2

    1. The three dimensions of the cybersecurity cube
    2. CIA Triad
    3. States of data
  • CyberSecurity Quiz 3

    1. Malware and malicious code
    2. Deception
    3. Wireless and mobile device attacks
  • FileHashingExercise

    MD5 Hashing exercise where I had to change the hash line to get a different outcome
  • 1st Cipher Chart from lesson practical

    Created a cipher chart to use when encrypting messages.
  • HashingAlgorithmResearch

    Researching different hashing algorithms and learning about SHA1 and MD5
  • Google Data Centre / Security Key

    Learning about google data centers security measures that they have in place and about security keys.
  • Thoughts on Kevin Mitnick interview

    He was the most elusive hacker of his time and managed to outrun the FBI countless amount of times.
  • Symmetric/Asymmetric Examples.

    Researching different algorithms and showing examples of them.
  • Packet Tracer - Creating a Cyber World

    1. Configuring basic server components
    2. Creating DNS records
    3. Activating email services
  • Creating a Cyber World Lab 2

    1) The FTP server - Used to transfer and upload files
    2) The WEB server - It accepts requests via HTTP. the network protocol created to distribute web pages.
    3) The Email server - Sends and receives emails on the email server
    4) The DNS server - DNS translates domain names to IP addresses
    5) The NTP server - Networking protocol for clock synchronization between computer systems
    6) The AAA server-Handles user requests for access to computer resources
  • Packet Tracer - Exploring file and data encryption Lab 3

    1) Access the encrypted contents of multiple files and transfer a file across the Internet to a centralized FTP server.
    2) Then i downloaded the file from the FTP server and decrypt the files’ contents.
    3) Then i used the client devices in the differing geographic regions to transfer a file with encrypted data to another device.
  • Packet Tracer - Using file and data integrity

    1) Verify the integrity of multiple files using hashes to ensure files have not been tampered with
    2) Use the client devices in the differing geographic regions to verify and transfer any suspect files.
    3) The IP addressing, network configuration, and service configurations are already complete
  • 3.3.3 Packet Tracer - Configuring VPN Transport Mode

    1) Sending Unencrypted FTP Traffic
    2) Configuring the VPN Client within Metropolis
    3) Sending Encrypted FTP Traffic
  • 3.2.7 Packet Tracer – WEP WPA2 PSK WPA2 RADIUS

    1) Configure WEP for Healthcare at Home
    2) Configure WPA2 PSK for Gotham Healthcare Branch
    3) Configure WPA2 RADIUS for Metropolis Bank HQ