CS 462

Cybersecurity Fundamentals

Course Description

Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and IDS/IPS; Kerberos; Transport Layer Security, including certificates; Network Layer Security.

Cybersecurity emphasizes prevention of attacks that are perpetrated using the Internet. It includes application security, information security, and network security. Because the foundations of cybersecurity rely so heavily on knowledge of networking, this course will cover networking background before discussing details of cybersecurity.

The course objectives are:

  • Gain experience with the online course system.
  • Explain the general architecture of the Internet, including the main functions of end systems and routers.
  • Describe the basic client-server architecture and how typical network applications (web, email) fit into the architecture.
  • Explain how web pages are requested and delivered using HTTP.
  • Explain in general how DNS enables our use of the Internet and, in particular, how hosts determine the IP address of network servers.
  • Explain how MAC addresses are used and assigned to a packet as it traverses a network.
  • Differentiate between wireless LANs and wired LANs.
  • Explain how IP CIDR addressing is performed and how an IP address is assigned from a group of available addresses.
  • Explain the core functions of TCP including details of connection setup.
  • Analyze and differentiate among types of malware and attacks.
  • Analyze and differentiate among types of wireless attacks and application attacks.
  • Identify vulnerabilities potentially present in DNS, databases, and web applications.
  • Summarize general cryptography concepts.
  • Describe how certificates can be used for authentication and encryption.
  • Explain how firewalls and VPNs can be used to protect a network.

Course Material

Blog Term Project

The objective of this project is to describe and explain a recent cybersecurity attack in at least 1,500 words, including details on the technologies used to perpetrate the attack.

The focus of this blog should be on how the vulnerability, breach, or attack works, including the devices, protocols, or applications that can be attacked. Additionally, you should describe how the topic affects today’s society. It is essential to use your own words and avoid copying any references found online. All sources must be cited correctly.

I chose to write this blog report on the casino attacks from 2023, where MGM Grand was hacked and information was held for ransom by an unknown group. The cause of the attack was a phone call from an internet connected device a few blocks away. The individual posed as a member of staff and called IT in order to get “their” credentials and login.

462-Cyber-Blog