Quantum Encryption & the Limits of Foolproof Security

This discussion explores quantum key distribution (QKD) and the idea of “foolproof” encryption. While quantum encryption may strengthen cryptographic defenses, major breaches like Equifax and Target demonstrate that operational failures—such as poor patch management and third-party risk—often cause data compromise. True cybersecurity requires both strong encryption and disciplined organizational practices.

Traffic Tracing & Network Packet Analysis

This assignment explores traffic tracing and network packet analysis using Wireshark in a virtualized lab environment. It examines ICMP, DNS, and FTP traffic to understand packet flow, filtering techniques, response behavior, and the security risks of plaintext protocols through hands-on analysis.