Do you see the standard tcp-ip handshake

Assignment Help Computer Network Security
Reference no: EM132548415

Assignment: Report select two of the topics below to create an actionable report with a common theme below the topics selected. Your analysis should demonstrate you understand the material. In general, each topic should be covered in 400-600 words.

1. On your personal computer, download, install, and run Wireshark. Wireshark is a network protocol analyzer that let's you capture and view network traffic. You may want to watch the videos found on that site first. With wireshark running, go to a standard website (e.g., Google, Yahoo, Amazon, etc.) and report what it shows you. Do you see the standard TCP/IP handshake? Do you see your http traffic? How could a network administrator use wireshark? Include screen captures of the wireshark showing your results.

2. On your personal computer, download, install, and run Nmap. Nmap or "Network Mapper" is a free, open-source tool for network discovery, system security testing, port availability, and system monitoring. Before using nmap, you should study the Reference Guide. If you are using a Windows operating system, you'll need to download ZenMap. For this exercise, run three different types of scans on another computer in your local network. MAKE SURE YOU HAVE THE SYSTEM OWNER'S PERMISSION FIRST! Provide screenshots of the command used and the results. What do the results tell you? How can a network security administrator use a tool like nmap?

3. Using your book and other resources from the Internet, define and discuss the following network protocols: TCP, UDP, IP, and ICMP. Include the differences between TCP & UDP and IP & ICMP. Why is this important for network security? Make sure you list any outside references in APA format.

4. Discuss the four different types of suspicious traffic signatures:

• Informational

• Reconnaissance

• Unauthorized access

• Denial of service .

5. Provide a detailed description of how each of the following TCP flags are utilized:

• SYN (Synchronize)

• ACK (Acknowledgement)

• PSH (Push)

• URG (Urgent)

• RST (Reset)

• FIN (Finished)

Reference no: EM132548415

Questions Cloud

Why the use of judgment in cost measurement can lead : Would you not think that, at least within their own organization, management could establish some guidelines for ensuring that cost measurement
What are the key requirements for licensure : What is the mission of the department/agency? What are the powers and duties of the department/agency? What are the key requirements for licensure?
Create a subtle misrepresentation of the data : There are many ways to misrepresent data through visualizations of data. There are a variety of websites that exist solely to put these types of graphics.
Which method of costing will you adopt and why : Contract costing- Cost plus Contract and Fixed Price Contract. In today's market condition which method of costing will you adopt and why?
Do you see the standard tcp-ip handshake : On your personal computer, download, install, and run Wireshark. Wireshark is a network protocol analyzer that let's you capture and view network traffic.
What is the breakeven point in number of car seats : What is the breakeven level in car seats, assuming the selling price goes up by 10%, fixed selling costs decline by 10%, and other fixed costs decline
Public health law and policy : Select one state and one federal law related to social distancing. Describe the underlying collective social values and public policy justifications for the law
Show profit using absorption costing and marginal costing : Show the profit using absorption costing and marginal costing.Variable production costs 9.60, Total production costs 15.00,Total variable cost 11.80
Further reforms of laws mentioned : In-depth research indicates there is a need for further reforms of the laws mentioned above so that it will be possible to achieve even better results.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd