This course introduced the networking and the Internet protocol stack, vulnerable protocols such as HTTP, DNS, and BGP, wireless communications, vulnerabilities, and security protocols. In addition, the course introduced cryptography, cyber threats and defenses, firewalls and IDS/IPS, the transport layer, and network layer security.
In this skill section, I have provided one of many writing assignments given weekly during the last half of the semester.
In the section titled “Measures and Metrics: Example Coverity”, there is a list of 13 vulnerabilities. Describe briefly the fixes for 5 of them? You can use reference to CVE numbers if needed. (11/4/2022)