Cybersecurity and Digital Forensics 2025

Category CS 462 Discussions

Module 14: Read the brief article about “SQL Injection loses #1 spot as most dangerous attack technique”. The article mentions a new technique used to rank the most dangerous vulnerabilities. At the end it mentions the top 3 vulnerabilities. Research on the top vulnerability listed and provide any other articles you came across about it.

This vulnerability of “Improper Restriction of Operations within the Bounds of a Memory Buffer” occurs when an offender operates outside the intended buffer allowing them to read, write, or execute at the outside location. Many articles have been written about… Continue Reading →

Module 13: Watch this video on “Cyber warfare is everywhere”. He explains how human warfare evolved through the ages and how cyberwarfare is a culmination of it all. Something new he talks about is the concept of “Kinetic Cyberwarfare” and provided “Stuxnet” as an example. Research on other examples and provide your feedback.

The definition of Kinetic Cyberwarfare is when someone causes direct or indirect harm such as injury or damage to a crucial system through vulnerabilities. This concept has already happened to hospitals, power plants, and even oil companies. An example other… Continue Reading →

Module 12: Watch this Ted talk on “Governments don’t understand cyber warfare. We need hackers”. How much do you agree with the speaker? Provide an additional article supporting your thoughts.

Many people argue that mainstream approaches to cybersecurity are insufficient in addressing the rapidly evolving world of cyber threats. Hackers with ethical/white hat hackers have valuable insights into vulnerabilities and potential attacks that could be exploited by offenders. Ethical hackers… Continue Reading →

Module 11: Read the article What Would a CYBERCOM-NSA Split Mean? This article was published in 2016. Research on this topic and find out whether there was a split between them. Were there any consequences? Also provide any interesting articles that support your findings.

https://www.fifthdomain.com/home/2016/10/10/what-would-a-cybercom-nsa-split-mean/ As of March of 2024, the split between U.S. Cyber Command (CYBERCOM) and the National Security Agency (NSA) was mentioned but has not been fully implemented. In 2016 when this article was written, there were discussions about separating the… Continue Reading →

Module 10: Watch this video on “The Humanity behind Cybersecurity Attacks”. The speaker talks about how he was a kicker for his school football team. He talks about various factors that might affect his kicking and making that score. The same analogy goes to the cybersecurity professionals defending against attackers. These professionals do not always have the perfect conditions to defend against attacks. Provide your opinions on this statement, and ways in which the “Humans Behind cybersecurity” (both attackers and defenders) get around each other.

Nobody is perfect. This is something everyone knows. Whether it is knowing information, bad days from illness or a live event, conflicts, and the list goes on. These factors can affect our thoughts and abilities. There is never a perfect… Continue Reading →

Module 9: In this module you learnt about vulnerabilities in many aspects of Information Technology. In this modern era IOT or Internet of Things is gaining popularity. However the question is are they secure? Or vulnerable? Watch this video on “Internet of Things Security” and give your opinions on the question above. The speaker puts forward an example of how he unlocked a smart padlock using the Bluetooth feature of a smartphone. Do some research and provide another example of how an IOT device had been compromised using a vulnerability.

This question appears many times throughout the topic of cybersecurity. As technology advances so do threats. I do believe there is also competition or race by company to release products before a competitor which can lead to vulnerabilities being overlooked…. Continue Reading →

Module 7: The learning material briefly explained “Stuxnet”. The video below gives an overview of the attack. Watch it and connect it with the topics you learned this week. Also provide your views on why Stuxnet is actually complicated and any other interesting articles you found online.

In this class for Module 7, the class learned about the National Vulnerability Database which gives a score called CVSS which stands for Common Vulnerability Scoring System. This system lists the vulnerabilities found in databases in a score that reflects… Continue Reading →

Module 6: Watch this video titled “Can we make Encryption that’s unbreakable?” The speaker shows a diagram at (2:09) of the records stolen since 2013 from the many famous companies around the world. What are your thoughts about it and the general idea of making encryption “Foolproof”? Share some other articles you searched online that gives any detailed information on the many attacks on those companies.

This was very interesting to watch. Seeing the number of breaches that have occurred since 2013 and the businesses used daily was shocking. I find the idea of battling quantum computers with quantum science intriguing. It reminds me of the… Continue Reading →

Module 5: Watch this TED talk. The presenter talks about his own 5 laws of cybersecurity. Do you agree with them all? Do you propose any changes you would like to bring in?

The first law mentioned, “If there is a vulnerability, It will be exploited.” is something I agree with. Hackers find any vulnerability they can to reach their end goal. Law 2, “everything is vulnerable in some way.” is correct. Even… Continue Reading →

Module 4: Pick one of the following three articles about attacks on vehicle security:

Answer both of the following questions: Many security companies have top-of-the-line software, yet cyberattacks still happen every day even if they are not reported. I don’t think anyone is ever 100% safe. I do think you can greatly decrease the… Continue Reading →

Module 3: Watch this video. This was a TED talk by Danny Hills. The topic was “The internet could crash. We need a Plan B” According to him, “From each according to their ability to each according to their need” was the concept of IP in the olden days. Discuss how it has changed in the present, preferably giving examples like he has talked about (Router bug causing flight to ground). Also, feel free to comment on your favorite parts of the video.

What I understood from this talk, is discussed how the world has become dependent on technology. In times when the internet is down, panic is involved. The internet leaves more vulnerability as banking, taxes, etc are primarily used online now…. Continue Reading →

Module 2: We have learnt a few protocols in this module like HTTP, FTP, SMTP. Search for any other well-known protocols and answer the following.

Reference: IBM warns of rising VoIP cyber-attacks. CSO Online. (2016, December 1). https://www.csoonline.com/article/559047/ibm-warns-of-rising-voip-cyber-attacks.html

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑