see rubric
1. first create initial discussion post and then 2. make a response to the two peers (caleb and kareem).
Category: Cyber Security
API Security Assignment: You will be learning about modern web-based API securit
API Security Assignment:
You will be learning about modern web-based API security principles in this project. These APIs are extremely popular ways of sharing data and integrating enterprise software systems. Understanding how they work and security best practices are paramount to a well rounded security expert.
You’ll use the same virtual machine you’ve been using.
I will share username and password of the vm
Attached the instructions.
API Security Assignment: You will be learning about modern web-based API securit
API Security Assignment:
You will be learning about modern web-based API security principles in this project. These APIs are extremely popular ways of sharing data and integrating enterprise software systems. Understanding how they work and security best practices are paramount to a well rounded security expert.
You’ll use the same virtual machine you’ve been using.
I will share username and password of the vm
Attached the instructions.
API Security Assignment: You will be learning about modern web-based API securit
API Security Assignment:
You will be learning about modern web-based API security principles in this project. These APIs are extremely popular ways of sharing data and integrating enterprise software systems. Understanding how they work and security best practices are paramount to a well rounded security expert.
You’ll use the same virtual machine you’ve been using.
I will share username and password of the vm
Attached the instructions.
API Security Assignment: You will be learning about modern web-based API securit
API Security Assignment:
You will be learning about modern web-based API security principles in this project. These APIs are extremely popular ways of sharing data and integrating enterprise software systems. Understanding how they work and security best practices are paramount to a well rounded security expert.
You’ll use the same virtual machine you’ve been using.
I will share username and password of the vm
Attached the instructions.
You will be learning about modern web-based API security principles in this proj
You will be learning about modern web-based API security principles in this project. These APIs are extremely popular ways of sharing data and integrating enterprise software systems. Understanding how they work and security best practices are paramount to a well rounded security expert. FIND FLAG 1-7 AND SEE THE INSTRUCTOINS FILE FOR SUBMISSION INSTRUCTIONS THANKS
You’ll use the same virtual machine you’ve been using.
The VM username and password is apisec and Chris_Cornell
VM Download link: https://cs6035.s3.amazonaws.com/CS6035-Fall-2024-RC2.ovaThe VM requires VirtualBox 7.0.18 or higher and we always recommend that you use the latest version. The current version is 7.0.20.
You are welcome to attempt to use VMWare products, Parallels, or any other hypervisor of your choice but we cannot provide help in troubleshooting for anything other than VirtualBox.
It’s also possible to emulate the VM on ARM based Macs. I’ve decided to provide some details on how I configure the emulation but again these instructions come without any warranty – we cannot grant extensions due to emulation issues.
OVA Info:
Name: CS6035-Fall-2024-RC2.ova
Size: 11873793024 bytes (11 GiB)
CRC32: D8729A2C
CRC64: D1A2D15B34FFADBD
SHA256: 87f61394d661e0a72f50c3a2121d34d15652ad7948152318aa9ff2345e0251d7
SHA1: 3ff69840f44a60c0881da6e98d0bd9a6ae43289a
BLAKE2sp: 9d032dbf6f706c8721c80b38c71e87760d9f9ad052718f88dd181d1f368569f0
Requirements: Follow instructions
The quiz is 10 MCQ and it is on the Cryptography module, I will only have 10 min
The quiz is 10 MCQ and it is on the Cryptography module, I will only have 10 minutes for the quiz, so as soon as the quiz starts I will send you the questions and I will be expecting the answer for all the questions ASAP because the time is very limited.
Directions: Complete discovery exercises for chapter 3 on pages 153-155. Submit
Directions:
Complete discovery exercises for chapter 3 on pages 153-155. Submit screenshots of your work.
In this hands-on activity, you will work with a simplified – and not very secure
In this hands-on activity, you will work with a simplified – and not very secure – version of one of the most popular public-key systems, RSA public-key encryption system. Like all public-key systems, the keys are derived using a “trapdoor” operation – an operation that is easy to do but difficult to “undo.” In RSA, this operation is the multiplication of 2 large prime numbers: it is easy and fast to multiply the 2 numbers together, but it is significantly more difficult and time consuming to factor the result back into its prime components. In this graded activity, you will use relatively small primes (3-digit #’s) to see how this system works. Use the accompanying Excel file to complete the following steps and submit the Excel/Word file(s) for the questions below.
that’s the intro.
there is the two documents that are related to each other, the word document gives you instructions and some of the results that you get in the excel document should be documented in the word document. at the end, there are 5 questions to be answered.
Use the assigned readings, public resources, and this report from the NSA below,
Use the assigned readings, public resources, and this report from the NSA below, create an incident report for the Project Gunman exploit. This should include:
1. Method of attack
2. Summary of how it was detected
3. Implications on national security
4. How it could have been prevented
5. Lessons learned
https://media.defense.gov/2021/Jul/13/2002761779/-1/-1/0/LEARNINGFROMTHEENEMYGUNMAN.PDF
Note: This should be a detailed, but summarization of the incident that occurred after WWII. This should not be more than 1 pages.