Disable port traffic for world of warcraft games

Assignment Help Computer Engineering
Reference no: EM133637812

In this lab, you will use the GVM Vulnerability Scan Report that was generated in the Vulnerability Scanning Lab. 

Note: There is no specific video associated with the Part 1 tasks. The Part 1 tasks are designed for you to perform independent research and to challenge your creativity. Please review the Topic 1 video entitled "1.5 Access Control Environment Installation Lab - pfSense Console Part 3" which touches upon pfSense functionality, especially creating rules, and object group aliases.

Choose five open/closed ports and determine the applicable protocol/application.

Perform the following tasks to implement the basics of pfSense post-installation configuration:

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft games ports (not the World of Warcraft website). Refer to "World of Warcraft Router and Firewall Port Information," located in the topic Resources, as needed.
  5. Disable inbound ICMP protocol.
  6. Choose a social media website and disable all domains for that website.
  7. Choose a video streaming website and enable all domains for that website.
  8. Provide screenshots of the original port scan, the traffic graph of the dashboard, the World of Warcraft disabled ports, the disabled inbound ICMP protocol, disabled domains for the social media website, enabled domains for the video streaming website, and the GVM Scan Report.

Part 2

Write a 250- to 500-word lab report (to include all screenshots from Part 1) addressing the following:

  1. Summarize the issues encountered, lessons learned, and successes in a bullet point format.
  2. Describe the screenshots provided.
  3. Examine a specific architecture and identify potential vulnerabilities. Include a description of 2-3 vulnerabilities of the hybrid network used in this lab.
  4. Explore in-depth advanced and novel areas of networks and protocols. Include a description of what you learned from exploring the networks and protocols in this lab.

Reference no: EM133637812

Questions Cloud

How would you describe the current national : How would you describe the current national (United States Cybersecurity policy on AI, why is it good and what should be done to better bolster our policy
Describe how the attacker was able to get in and out : Describe how the attacker was able to get in and out of the system, as well as the threat vector. Examine and explain the effects of the attack on the various
War between israel-hamas impacting the palestinian people : Art addressing Anti Asian Hate, the war in Ukraine and most recently the war between Israel and Hamas impacting the Palestinian people.
What is the hardened border paradox : What is the Hardened Border Paradox What is the "Open Border Paradox? How can both be overcome? Compare and contrast the two
Disable port traffic for world of warcraft games : Disable port traffic for World of Warcraft games ports (not the World of Warcraft website). Refer to "World of Warcraft Router and Firewall Port Information
What is the function of iptables command : What is packet filtering firewall and Differentiate Stateless Operation from Stateful Inspection - What is the function of iptables command
How to create a health information privacy : How to create a health information privacy and security policy for the organization?
Explain various ways of authentication system : Write a pseudocode that would detect whether a given number is divisible by 5 or not and Explain various ways of authentication system
Which would serve as the best foundation : Which is the weakest? Which would serve as the best foundation for an agreement between parties? Why

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the general information security steps and controls

Describe the general Information Security steps and controls that you would recommend to the Board to secure the Hybrid Cloud

  Determine the coins to be dispensed as change

Determine the coins to be dispensed as change. This calculation will depend on the amount to be dispensed and also on the number of coins left in the stock.

  What is meant cisc machines versus risc machines

Discuss what is meant CISC machines versus RISC machines.

  List the top locationids with the maximum overall activity

CS 7265 Kennesaw State University, LocationID is simply the sum of all pick-ups and all drop-offs at that LocationID. In case of a tie, the lower LocationID

  Describe tls-ssl vpn handshake followed by ipsec handshake

Describe the TLS/SSL VPN handshake followed by the IPSEC handshake. Compare the two protocols and explain, according to you which one is better.

  What is the number of page faults for the given reference

Using the LRU replacement algorithm, what is the number of page faults for the given reference string?

  Discuss the components of the coso framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related.

  What is the minimum cost plan to crash the project

Build a spreadsheet model of the project. Use Solver to find the optimal solution. What's the minimum cost plan to crash the project?

  List the five criteria for systems project selection

List the five criteria for systems project selection. What does COTS stand for? Define tangible costs and benefits. Give an example of each one. When is break-even analysis useful? List the five steps in interview preparation.

  Record legal concerns in regards to search and seizure

In your investigative journal, record legal concerns in regards to search and seizure, expectation of privacy, and collecting and handling evidence.

  Define the different routing algorithms

Sterling Co. wants you to plan a network infrastructure for them. They have five divisions with several hundred users at each division across the United States.

  ITS832 Information Technology In A Global Economy Question

ITS832 Information Technology In A Global Economy assignment help and assessment help, University of the Cumberlands - Chapter 5 discusses decision making.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd