Introduction to Cybersecurity
CYSE 300
CYSE 300 provided an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students were expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.
​
The course objectives are:
-
Identify and prioritize information assets;
-
Identify and prioritize threats to information assets;
-
Define an information security strategy and architecture;
-
Plan for and respond to intruders in an information system;
-
Describe legal and public relations implications of security and privacy issues; and
-
Present a disaster recovery plan for the recovery of information assets after an incident.
​
Final Research Paper
The Horror of Identity Theft
The paper focuses on the biggest problem that the United States is facing, Identity Theft, which cases have been going up since there are many malicious people in cyberspace. The paper gives an example of a case where a woman faced so many years to recover financially from the person who stole her identity very easily.
The paper focuses on how much damage it causes and the long journey to recover from it. Also, it gives a reason why many people should know the proper steps to avoid identity theft and to not become a victim.
CYSE 300 Labs
Lab 1: Performing Reconnaissance and Probing Using Common Tools
Used Wireshark to capture and analyze network traffic, use Nessus to scan the network, review a sample collection of data using NetWitness Investigator, connect to a remote Windows machine, and explore two file transfer applications, FileZilla and Tftpd64. Also, used PuTTY to connect to a Linux machine and run several Cisco commands to display statistics for the network interfaces. Finally, used Zenmap to perform a scan of the network and create a network topology chart.
​
Overall, I learned to:
1. Explore common network scanning and analysis tools
2. Perform network reconnaissance and probing on the machines in the Virtual Security Cloud Lab (VSCL)
3. Use Zenmap to perform an Intense scan on an entire subnetwork (172.30.0.0/24)
4. Create a Fisheye Bubble chart to explain the relationships between devices on a network
5. Explain how attackers use common network scanning and analysis tools to compromise networks
Section 1
S1.ArrivalTime WiresharkThe Arrival Time for the Wireshark ICMP traffic | S1. Attachment NetWitness DemoThe filename of the attachment in the NetWitness Investigator Demo Collection. | S1. FishEye Chart ZenmapA Fisheye Bubble chart from Zenmap scan. |
---|
Section 2
S2. Arrival Time WiresharkThe Arrival Time for the Wireshark ICMP traffic | S2. Fisheye ZenmapA Fisheye Bubble chart from Zenmap scan. | S2. NetWitness file detailsThe file details of the creditcards.txt attachment in the NetWitness Investigator. |
---|---|---|
S2. TFTP File transferThe successful TFTP file transfer. | S2. Zenmap scan resultsThe results of the second Zenmap scan. |