CS462

Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and IDS/IPS; Kerberos; Transport Layer Security, including certificates; Network Layer Security.


Course Work:


Discussion Post:

We have learnt a few protocols in this module like HTTP, FTP, SMTP. Search for any other well-known protocols and answer the following.

  1. Full form
  2. Port number
  3. What it does / Functionality
  4. Any interesting news articles about them, like a security breach or vulnerabilities

My Response:

HTTPS, short for Hypertext Transfer Protocol Secure, is like a secure version of regular web browsing. It adds a layer of encryption to the data shared between your web browser and your website, keeping your information safe. It’s especially important for things like online shopping or banking.

Now, about port numbers – they’re like specific doors that let different services communicate on the internet. They help ensure that data goes to the right place on your device. For example, web traffic often uses port 80 for regular browsing and port 443 for secure browsing (HTTPS).

HTTPS is generally considered a secure protocol for transmitting data over the Internet. However, a major vulnerability in HTTPS is the Drown attack which helps attackers break the encryption, steal credit card info and passwords


Discussion Post:

Read the article What Would a CYBERCOM-NSA Split Mean? : https://www.fifthdomain.com/home/2016/10/10/what-would-a-cybercom-nsa-split-mean/Links to an external site.

This article was published in 2016. Research on this topic and find out whether there was a split between them. Were there any consequences? Also provide any interesting articles that support your findings.

My Response:

As of the latest information available in 2023, there hasn’t been an official split between the National Security Agency (NSA) and U.S. Cyber Command (CYBERCOM). They still operate together under a joint arrangement, although there have been talks about the possibility of separating them. The discussion centers on whether maintaining their current structure or splitting them up would be more advantageous given their extensive responsibilities. While the idea of a split has been brought up for many years, it hasn’t been put into action yet.

https://defensescoop.com/2023/07/21/cybercom-nsa-nominee-argues-severing-dual-hat-would-be-more-time-consuming-more-complex-and-less-effective/Links to an external site.

https://www.defense.gov/News/News-Stories/Article/Article/3322765/cyber-command-nsa-successes-point-way-to-future/Links to an external site.