This discussion explores quantum key distribution (QKD) and the idea of “foolproof” encryption. While quantum encryption may strengthen cryptographic defenses, major breaches like Equifax and Target demonstrate that operational failures—such as poor patch management and third-party risk—often cause data compromise. True cybersecurity requires both strong encryption and disciplined organizational practices.
Category: Uncategorized
Traffic Tracing & Network Packet Analysis
This assignment explores traffic tracing and network packet analysis using Wireshark in a virtualized lab environment. It examines ICMP, DNS, and FTP traffic to understand packet flow, filtering techniques, response behavior, and the security risks of plaintext protocols through hands-on analysis.
Malicious Code and Activity – Mitigation Methods
Overview of malicious code threats and mitigation methods, including detection, containment, system hardening, user awareness, and modern cybersecurity defenses.