defining computer network terminologies

Questions, Sketches, Calculations, and Labs

1. Cybersecurity at the University of Maryland

UMD Cybersecurity Club

Cybersecurity at the iSchool

Division of Research Cybersecurity

Choose any aspect of Maryland’s local cybersecurity resources and briefly explain how it might be relevant to your career (even if you do not intend to work directly in cybersecurity). (>100 words)

2. Cybersecurity Careers

Choose a career from this site Cybersecurity (Links to an external site.)and briefly explain why that might be relevant to your future academic or employment goals, even if the career is not exactly what you plan to do. (>100 words)

3. Cryptography Terminology

Cryptography for Absolute Beginners (Links to an external site.)

Wikipedia Public Key Cryptography (Links to an external site.)

Wikipedia Symmetric Key Algorithm (Links to an external site.)

In an interview at a whiteboard, you are given two minutes to concisely and precisely explain the concept of “public key cryptography.” What would you say and draw? (>100 words)

4. Virtual Private Networks (VPN)

Wikipedia VPNs (Links to an external site.)

In an interview at a whiteboard, you are given two minutes to concisely and precisely explain the concept of “VPN.” What would you say and draw? (>100 words)

5. Blockchain

Wikipedia Blockchain (Links to an external site.)

Paper Explaining Blockchain (Links to an external site.)

In an interview at a whiteboard, you are given two minutes to concisely and precisely explain the concept of “Blockchain.” What would you say and draw? (>100 words)

FOR EXTRA HOMEWORK CREDIT:

6. LAMP Stack

Wikipedia LAMP Stack (Links to an external site.)

How does the LAMP stack relate to what you have learned in INST346? (>100 words)

7. Ethical Hacking

What is an Ethical Hacker? (Links to an external site.)

Ethical Hacking Council (Links to an external site.)

CEH (Links to an external site.)

Kali Linux (Links to an external site.)

How might ethical hacking be worth your time? (>100 words)

(Links to an external site.)

8. Please Review EC Council Code of Ethics (Links to an external site.)

Type out “I, (your name), pledge to using any knowledge, skills, or tools acquired in INST346, and any other iSchool courses, in an ethical, professional, and legal manner, consistent with all rules and guidelines of the University of Maryland, the State of Maryland, my workplace, my ISPs, and any other computer network to which I may have access.”

9. The Cybersecurity Ecosystem

Briefly share one highlight each of Mitre’s CVEs (Links to an external site.), Cisco Talos (Links to an external site.), Akamai Real-Time Internet Monitor (Links to an external site.) and Shodan. (Links to an external site.)(>100 words)

10. Cybersecurity in the News

Please skim all of the articles. Choose one article that interests you. For that article, briefly summarize ONE cybersecurity incident they describe, what vulnerability existed, how it was exploited, and some of the consequences. (>100 words)

(Links to an external site.)Going Dark (Links to an external site.)

Keeping Spectre Secret (Links to an external site.)

Stuxnet (Links to an external site.)

Mirai Botnet (Links to an external site.)

The Heartbleed Bug (Links to an external site.)

Hacking the IoT (Links to an external site.)

The Great Firewall of China? (Links to an external site.)

The Yahoo Breach (Links to an external site.)

Consequential computer code (Links to an external site.)

The Mueller Report on Russian Interference in the 2016 Presidential Election