{"id":261,"date":"2025-12-04T00:54:59","date_gmt":"2025-12-04T00:54:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ids493fall25\/?page_id=261"},"modified":"2025-12-04T01:55:10","modified_gmt":"2025-12-04T01:55:10","slug":"cyber-artistry","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ids493fall25\/cyber-artistry\/","title":{"rendered":"Cyber Artistry"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Drawing of End-to-end Authentication Between Two Hosts<\/h2>\n\n\n\n<p>Below, is a drawing I created for my CS 464 course. The image represents End-to-end authentication and encryption desired between two hosts. The drawing solidifies this representation because it reflects: <\/p>\n\n\n\n<ol>\n<li>Transport adjacency with encryption applied before authentication.<\/li>\n\n\n\n<li>A transport SA bundled inside a tunnel SA with encryption applied before authentication.<\/li>\n\n\n\n<li>A transport SA bundled inside a tunnel SA with authentication applied before encryption.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-201452.png\"><img loading=\"lazy\" decoding=\"async\" width=\"990\" height=\"707\" src=\"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-201452.png\" alt=\"\" class=\"wp-image-267\" srcset=\"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-201452.png 990w, https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-201452-300x214.png 300w, https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-201452-768x548.png 768w, https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-201452-420x300.png 420w\" sizes=\"(max-width: 990px) 100vw, 990px\" \/><\/a><\/figure>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">Personal Network Diagram<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"746\" src=\"http:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-195616.png\" alt=\"\" class=\"wp-image-265\" srcset=\"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-195616.png 792w, https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-195616-300x283.png 300w, https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-195616-768x723.png 768w, https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-content\/uploads\/sites\/40235\/2025\/12\/Screenshot-2025-12-03-195616-318x300.png 318w\" sizes=\"(max-width: 792px) 100vw, 792px\" \/><\/figure>\n\n\n\n<p>Above, I have designed a full diagram of my home computing network. I decided to design my network with graphic images because I felt that it was more appealing for the reader to understand how a network should operate on a personal level. The tip of the diagram would be the internet which supports all devices that are connected to the network by the router. The router is located in the center. There are also three personal laptops which would be for myself, sister, and mother. The diagram also represents three personal smart TVs that are designated to each family member. I have also included a tablet owned by my sister. There is also a printer that the entire family uses and finally three smartphones for each member of the family. I loved creating this project for my IT 315 class because I believe this project represents how a personal home network should operate while also providing a vivid visualization. <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Drawing of End-to-end Authentication Between Two Hosts Below, is a drawing I created for my CS 464 course. The image represents End-to-end authentication and encryption desired between two hosts. The drawing solidifies this representation because it reflects:<\/p>\n","protected":false},"author":15134,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/pages\/261"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/users\/15134"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/comments?post=261"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/pages\/261\/revisions"}],"predecessor-version":[{"id":270,"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/pages\/261\/revisions\/270"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ids493fall25\/wp-json\/wp\/v2\/media?parent=261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}