This lab assignment covers network scanning techniques using Nmap and firewall configuration with pfSense. It explores the vulnerabilities discovered through the scanning process, such as open ports and potential exploitation, and demonstrates how configuring firewall rules can mitigate these risks. The exercise also evaluates the advantages and disadvantages of blocking ICMP traffic for network defense and operational efficiency.
Category: Cybersecurity
The Five Laws of Cybersecurity and the Weakest Link Problem
Analyzes the Five Laws of Cybersecurity, exploring vulnerabilities, social engineering, emerging risks, and why security is only as strong as its weakest link.
The Critical Need for Cybersecurity in Today’s Economy
This essay examines the role of cybersecurity in today’s economy, highlighting its importance in protecting supply chains, critical infrastructure, and business continuity. It explores the readiness economy, workforce opportunities in cybersecurity, and the growing need for resilience against nation-state attacks and sophisticated cyber threats.
Autonomous Vehicles and Cybersecurity: Risks, Realities, and the Case for Transparency
Examines cybersecurity risks in autonomous vehicles, including remote hacking threats, regulatory oversight, and the debate over open-source transparency.