by | Jul 5, 2024 | Cyber Security
To protect DNS, some providers are using DNS-over-HTTPS, also called DoH. As its name implies, DoH uses HTTPS instead of HTTP to send DNS queries via an encrypted HTTPS connection (Port 443) rather than sending them in clear text (Port 53). The encrypted DoH query is...
by | Jul 5, 2024 | Cyber Security
North Ridge Security provides security consulting and assurance services. You have recently been hired as an intern to assist them. The new CEO of Premier Landscape Services (PLS) wants to migrate all IT functions to the cloud. He argues that PLS could then downsize...
by | Jul 5, 2024 | Cyber Security
North Ridge Security provides security consulting and assurance services. You have recently been hired as an intern to assist them. Believe It’s Magic (BIM) is a regional hair salon with retail outlets in major cities. Because the company was the victim of...
by | Jul 5, 2024 | Cyber Security
You will be presented with four questions to be answered in your own words. You may use any legitimate resource from the web, textbook, lecture, etc., but use your own analytical thought process to ensure evidence of understanding of the material. Your response to...
by | Jul 5, 2024 | Cyber Security
With apologies to Humphrey Bogart (Treasures of the Sierra Madre), I want to get you all to think and discuss the long historical argument as to whether we really can have randomness in cryptography. Some argue that RNG can be truly random while others state there is...
by | Jul 5, 2024 | Cyber Security
Each week, we will have a “This Week in Cybersecurity” discussion that focuses on developing issues in Cybersecurity. This discussion will provide you the opportunity to stay ‘attuned’ to current Cybersecurity issues in the news and share at...