{"id":219,"date":"2025-12-05T18:50:43","date_gmt":"2025-12-05T18:50:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/acuff\/?p=219"},"modified":"2025-12-05T18:50:43","modified_gmt":"2025-12-05T18:50:43","slug":"skills-involving-cybersecurity-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/acuff\/2025\/12\/05\/skills-involving-cybersecurity-3\/","title":{"rendered":"Skills Involving Cybersecurity #3"},"content":{"rendered":"\n<p><strong>Skill 3: Malware Prevention and Detection<\/strong><\/p>\n\n\n\n<p>Supporting Artifact 1:&nbsp;Learning about Malware and Other Types of Attacks<\/p>\n\n\n\n<p>Brief Description:\u00a0Of course, in order to do cybersecurity, you have to know what you&#8217;re getting into with the field. The module for this topic discussed what malware was, other type of attacks similar to it, and the attacker&#8217;s motivation\/tactics. This allowed us to know the attacker&#8217;s perspective on things, to then prevent them from being able to succeed.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/HW4-CH3-Andrea.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of HW4-CH3-Andrea.\"><\/object><a id=\"wp-block-file--media-4ed1077a-7a48-47e2-8a5e-38fb83253b0c\" href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/HW4-CH3-Andrea.pdf\">HW4-CH3-Andrea<\/a><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/HW4-CH3-Andrea.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4ed1077a-7a48-47e2-8a5e-38fb83253b0c\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 2:&nbsp; Knowing Vulnerabilities<\/p>\n\n\n\n<p>Brief Description:\u00a0This is similar to knowing about malware\/other cyberattacks, but this time we learned about the different types of vulnerabilities and how they could affect our systems.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-2-Andrea-Cuffee.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-2-Andrea-Cuffee.\"><\/object><a id=\"wp-block-file--media-dc537bb7-0011-4010-928b-fda40f82414f\" href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-2-Andrea-Cuffee.pdf\">Lab-2-Andrea-Cuffee<\/a><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-2-Andrea-Cuffee.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-dc537bb7-0011-4010-928b-fda40f82414f\">Download<\/a><\/div>\n\n\n\n<p>Supporting Artifact 3:&nbsp;Malware Analysis Assignment<\/p>\n\n\n\n<p>Brief Description 3:\u00a0In my CYSE 450 class, we did an assignment which involved downloading two types of malwares from the bazaar website and analyzing it through the any.run website. This was so that we can learn the differences between them and their main characteristics.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-3-Andrea-Cuffee.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-3-Andrea-Cuffee.\"><\/object><a id=\"wp-block-file--media-b2c5c2c4-c11c-4abd-8480-8836357f64e6\" href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-3-Andrea-Cuffee.pdf\">Lab-3-Andrea-Cuffee<\/a><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/wp-content\/uploads\/sites\/40197\/2025\/12\/Lab-3-Andrea-Cuffee.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b2c5c2c4-c11c-4abd-8480-8836357f64e6\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Skill 3: Malware Prevention and Detection Supporting Artifact 1:&nbsp;Learning about Malware and Other Types of Attacks Brief Description:\u00a0Of course, in order to do cybersecurity, you have to know what you&#8217;re getting into with the field. The module for this topic discussed what malware was, other type of attacks similar to it, and the attacker&#8217;s motivation\/tactics&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/2025\/12\/05\/skills-involving-cybersecurity-3\/\">Read More<\/a><\/div>\n","protected":false},"author":25753,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/posts\/219"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/users\/25753"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/comments?post=219"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/posts\/219\/revisions"}],"predecessor-version":[{"id":224,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/posts\/219\/revisions\/224"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/media?parent=219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/categories?post=219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/tags?post=219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}