{"id":125,"date":"2023-02-06T00:38:52","date_gmt":"2023-02-06T00:38:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=125"},"modified":"2024-02-26T22:02:25","modified_gmt":"2024-02-26T22:02:25","slug":"cyse-406","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ryanjackson\/cyse-406\/","title":{"rendered":"Cybersecurity Fundamentals"},"content":{"rendered":"\n<p>This course serves as an introduction to networking and the Internet protocol stack, covering vulnerable protocols such as HTTP, DNS, and BGP. It also includes an overview of wireless communications, their vulnerabilities, and security protocols. The curriculum is an introduction to cryptography, discussions on cyber threats and defenses, firewalls, IDS\/IPS, Kerberos, and more. The emphasis is on preventing Internet-based attacks, covering application security, information security, and network security, with a foundational focus on networking knowledge before delving into cybersecurity details. Below, I have included a paper I wrote for the \u201cBlog Project.\u201d The focus of the \u201cblog\u201d is on how the vulnerability, breach, or attack works, including the devices, protocols, or applications that can be attacked. Instructions ask for a description of how a recent cybersecurity attack affected today&#8217;s society.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-content\/uploads\/sites\/32615\/2024\/02\/annotated-RyanJackson_CS462_Blog.pdf\" type=\"application\/pdf\" style=\"width:100%;height:840px\" aria-label=\"Embed of annotated-RyanJackson_CS462_Blog.\"><\/object><a id=\"wp-block-file--media-c9c4cf4e-25ca-4597-af7b-f77cf15ef04a\" href=\"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-content\/uploads\/sites\/32615\/2024\/02\/annotated-RyanJackson_CS462_Blog.pdf\">annotated-RyanJackson_CS462_Blog<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-content\/uploads\/sites\/32615\/2024\/02\/annotated-RyanJackson_CS462_Blog.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c9c4cf4e-25ca-4597-af7b-f77cf15ef04a\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course serves as an introduction to networking and the Internet protocol stack, covering vulnerable protocols such as HTTP, DNS, and BGP. It also includes an overview of wireless communications, their vulnerabilities, and security protocols. The curriculum is an introduction to cryptography, discussions on cyber threats and defenses, firewalls, IDS\/IPS, Kerberos, and more. The emphasis&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ryanjackson\/cyse-406\/\">Read More<\/a><\/div>\n","protected":false},"author":24148,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-json\/wp\/v2\/pages\/125"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-json\/wp\/v2\/users\/24148"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-json\/wp\/v2\/pages\/125\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-json\/wp\/v2\/pages\/125\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ryanjackson\/wp-json\/wp\/v2\/media?parent=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}