{"id":141,"date":"2024-02-05T00:18:11","date_gmt":"2024-02-05T00:18:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-08-08T21:47:29","modified_gmt":"2025-08-08T21:47:29","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bbent24\/cyse-300\/","title":{"rendered":"Network Security &amp; Threat Prevention"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Skill # 1<\/h1>\n<h3 data-start=\"475\" data-end=\"495\"><strong data-start=\"479\" data-end=\"495\">Introduction<\/strong><\/h3>\n<p data-start=\"496\" data-end=\"898\">Network Security &amp; Threat Prevention is at the heart of keeping information safe. Data constantly moves between devices and systems. Without the right protections, it can be stolen, changed, or blocked. In my studies, I have learned how to protect information as it travels across networks, identify weaknesses before they are exploited, and apply security measures to stop attacks before they start.<\/p>\n<p data-start=\"900\" data-end=\"1288\">This skill combines technical knowledge with strategic thinking. You must understand how networks are built and how attackers try to break into them. You also need to know which defenses will work best in different situations. The artifacts on this page show my ability to design secure network structures, analyze risks, and create defenses that respond to the changing threat landscape.<\/p>\n<h2 data-start=\"1295\" data-end=\"1335\"><strong data-start=\"1298\" data-end=\"1335\">Artifact 1: Network Security Plan<\/strong><\/h2>\n<p data-start=\"1336\" data-end=\"1688\"><strong data-start=\"1336\" data-end=\"1352\">Description:<\/strong><br data-start=\"1352\" data-end=\"1355\" \/>This project involved creating a detailed security plan for a medium-sized organization\u2019s internal network. I included firewall rules, intrusion detection systems, and access control policies. The plan explained how each security measure protected the network from specific threats such as malware, phishing, and unauthorized access.<\/p>\n<p data-start=\"1690\" data-end=\"2158\"><strong data-start=\"1690\" data-end=\"1705\">Reflection:<\/strong><br data-start=\"1705\" data-end=\"1708\" \/>This artifact shows my ability to think about security from the ground up. I had to consider both the technical setup and the human factors. For example, even the best firewall will fail if users are tricked into giving away passwords. I learned to balance hardware, software, and training as part of a complete defense strategy. This experience will help me in real-world jobs where I need to protect networks of different sizes and purposes.<\/p>\n<figure id=\"attachment_435\" aria-describedby=\"caption-attachment-435\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-435\" src=\"http:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/network-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/network-300x300.png 300w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/network-150x150.png 150w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/network-768x768.png 768w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/network.png 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-435\" class=\"wp-caption-text\">Diagram of a secure network architecture featuring layered defenses, including a firewall, intrusion detection system, VPN, and segmented internal networks to prevent unauthorized access.<\/figcaption><\/figure>\n<h2 data-start=\"2314\" data-end=\"2355\"><strong data-start=\"2317\" data-end=\"2355\">Artifact 2: Packet Analysis Report<\/strong><\/h2>\n<p data-start=\"2356\" data-end=\"2651\"><strong data-start=\"2356\" data-end=\"2372\">Description:<\/strong><br data-start=\"2372\" data-end=\"2375\" \/>In this lab assignment, I used Wireshark to capture and analyze network traffic. I identified normal patterns as well as suspicious activity that suggested possible attacks. The report explained what the captured data meant and how it could be used to detect and stop threats.<\/p>\n<p data-start=\"2653\" data-end=\"3036\"><strong data-start=\"2653\" data-end=\"2668\">Reflection:<\/strong><br data-start=\"2668\" data-end=\"2671\" \/>This artifact shows my skill in monitoring and analyzing network traffic in real time. Packet analysis is a core skill for detecting attacks early. I learned how to filter through large amounts of data to find the pieces that matter. This skill is directly relevant to jobs in Security Operations Centers where quick detection and response can prevent major damage.<\/p>\n<h4 data-start=\"3038\" data-end=\"3154\"><b>Snippet from the report:<\/b><\/h4>\n<p style=\"text-align: center\" data-start=\"91\" data-end=\"528\"><strong data-start=\"91\" data-end=\"150\">Intro blurb:<\/strong><br data-start=\"150\" data-end=\"153\" \/>This report shows how I captured and analyzed live network traffic to detect suspicious behavior. I used Wireshark to identify normal patterns and then filtered for anomalies such as unusual ports, malformed packets, and repeated authentication failures. The findings show how to separate noise from signal and turn raw packet data into clear security insights.<\/p>\n<p style=\"text-align: center\" data-start=\"530\" data-end=\"562\"><strong data-start=\"530\" data-end=\"562\">At-a-glance:<\/strong><\/p>\n<ol>\n<li style=\"text-align: center\" data-start=\"565\" data-end=\"622\"><strong data-start=\"565\" data-end=\"575\">Tools:<\/strong> Wireshark, PCAP filters, protocol dissectors<\/li>\n<li style=\"text-align: center\" data-start=\"625\" data-end=\"691\"><strong data-start=\"625\" data-end=\"635\">Focus:<\/strong> HTTP\/S, DNS, TCP handshakes, ARP, and TLS negotiation<\/li>\n<li style=\"text-align: center\" data-start=\"694\" data-end=\"835\"><strong data-start=\"694\" data-end=\"709\">Detections:<\/strong> Repeated SYN packets without ACK, DNS queries to known bad domains, and plaintext credentials in misconfigured test traffic<\/li>\n<li style=\"text-align: center\" data-start=\"838\" data-end=\"942\"><strong data-start=\"838\" data-end=\"850\">Outcome:<\/strong> Alert rules proposed for SOC playbooks and a set of tuned display filters for faster triage<\/li>\n<\/ol>\n<p style=\"text-align: center\" data-start=\"944\" data-end=\"1141\">\u201cFiltering suspicious DNS traffic. Queries to a sinkholed domain clustered within a 2-minute window suggested automated beaconing.\u201d<\/p>\n<blockquote data-start=\"1194\" data-end=\"1469\">\n<p data-start=\"1196\" data-end=\"1469\">\u201cPacket captures revealed a burst of DNS queries using randomized subdomains. The pattern and timing aligned with typical C2 beaconing. Blocking the egress domain and adding a detection rule for high-frequency NXDOMAIN responses reduced false negatives in follow-up tests.\u201d<\/p>\n<\/blockquote>\n<p style=\"text-align: center\" data-start=\"1471\" data-end=\"1680\"><strong data-start=\"1471\" data-end=\"1526\">For accessibility:<\/strong><br data-start=\"1526\" data-end=\"1529\" \/>\u201cWireshark capture showing DNS requests to a suspicious domain with time-sequence spikes and filter bar highlighting \u2018dns and frame.time_delta &gt; 0.5\u2019.\u201d<\/p>\n<p data-start=\"1471\" data-end=\"1680\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-438 aligncenter\" src=\"http:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/The-results-from-the-Wireshark-packets-capture-300x158.jpg\" alt=\"\" width=\"338\" height=\"178\" srcset=\"https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/The-results-from-the-Wireshark-packets-capture-300x158.jpg 300w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/The-results-from-the-Wireshark-packets-capture-768x406.jpg 768w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/The-results-from-the-Wireshark-packets-capture-568x300.jpg 568w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/The-results-from-the-Wireshark-packets-capture.jpg 850w\" sizes=\"(max-width: 338px) 100vw, 338px\" \/><\/p>\n<p style=\"text-align: center\" data-start=\"1471\" data-end=\"1680\"><strong>Filter Cheatsheet box:<\/strong><\/p>\n<p style=\"text-align: center\"><em>tcp.flags.syn == 1 and tcp.flags.ack == 0<\/em><\/p>\n<p style=\"text-align: center\"><em>dns.flags.rcode == 3<\/em><\/p>\n<p style=\"text-align: center\"><em>http.request.method<\/em><\/p>\n<p style=\"text-align: center\"><em>tls.handshake.extensions_server_name contains &#8220;example.com&#8221;<\/em><\/p>\n<h2 data-start=\"3161\" data-end=\"3213\"><strong data-start=\"3164\" data-end=\"3213\">Artifact 3: Simulated Network Defense Project<\/strong><\/h2>\n<p data-start=\"3214\" data-end=\"3530\"><strong data-start=\"3214\" data-end=\"3230\">Description:<\/strong><br data-start=\"3230\" data-end=\"3233\" \/>This hands-on exercise was part of a cybersecurity lab simulation. I was given a virtual network that was under attack. My task was to identify the vulnerabilities, apply security patches, and strengthen the defenses. The simulation measured how quickly and effectively I could secure the network.<\/p>\n<p data-start=\"3532\" data-end=\"3941\"><strong data-start=\"3532\" data-end=\"3547\">Reflection:<\/strong><br data-start=\"3547\" data-end=\"3550\" \/>This artifact highlights my ability to respond under pressure. The simulation required quick thinking and knowledge of multiple security tools. I had to patch systems, configure defenses, and test the results while attacks were still happening. This mirrors the real-world situations where time is critical. It showed me that preparation and practice are key to successful threat prevention.<\/p>\n<figure id=\"attachment_436\" aria-describedby=\"caption-attachment-436\" style=\"width: 466px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-436\" src=\"http:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/artifact-3-300x192.png\" alt=\"\" width=\"466\" height=\"298\" srcset=\"https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/artifact-3-300x192.png 300w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/artifact-3-1024x655.png 1024w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/artifact-3-768x491.png 768w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/artifact-3-469x300.png 469w, https:\/\/sites.wp.odu.edu\/bbent24\/wp-content\/uploads\/sites\/35773\/2025\/08\/artifact-3.png 1058w\" sizes=\"(max-width: 466px) 100vw, 466px\" \/><figcaption id=\"caption-attachment-436\" class=\"wp-caption-text\">Activity diagram of my incident response workflow from IDS alert to recovery and documentation during the simulated attack.<\/figcaption><\/figure>\n<h3 data-start=\"4047\" data-end=\"4073\"><strong data-start=\"4051\" data-end=\"4073\">Closing Reflection<\/strong><\/h3>\n<p data-start=\"4074\" data-end=\"4486\">Network Security &amp; Threat Prevention is a skill that combines planning, analysis, and quick response. The three artifacts on this page each show a different part of that skill. The Network Security Plan focuses on building strong defenses from the start. The Packet Analysis Report shows the value of constant monitoring. The Simulated Network Defense Project proves the need for rapid action during an attack.<\/p>\n<p data-start=\"4488\" data-end=\"4820\">These experiences have prepared me to take on real-world challenges in cybersecurity. They have taught me that protecting a network is never a one-time task. It is an ongoing process that requires constant learning and adaptation. This is why I am committed to keeping my skills current and ready for whatever threats may come next.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Skill # 1 Introduction Network Security &amp; Threat Prevention is at the heart of keeping information safe. Data constantly moves between devices and systems. Without the right protections, it can be stolen, changed, or blocked. In my studies, I have learned how to protect information as it travels across networks, identify weaknesses before they are&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bbent24\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":28614,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/users\/28614"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":444,"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/pages\/141\/revisions\/444"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bbent24\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}