ECE 4490 Computer Network Security Assignment

Assignment Help Computer Engineering
Reference no: EM133043459

ECE 4490 Computer Network Security - Clemson University

RRB

Install Fedora Core or Ubuntu under VMWARE or VirtualBox to make your own virtual machine. The grader will give you instructions as to how to use virtual machines and how to access the necessary ISO files. Use one of the designated workstations in the security laboratory. Make certain that the Linux virtual machine can access the network in the laboratory. Be certain that it allows remote sessions to be initiated using both telnet and ssh. Be certain that Wireshark is installed. Find a partner, have the partner give you access to their machine. This project needs a partner. Note that the Fedora ISO contains all the software packages you will need. This makes life much easier for you, since you will not have to search for compatible software versions and transfer them to your virtual machine. You probably will have to disable the VM firewall and activate Telnet on your Linux virtual machine. Use Wireshark to collect network traffic information for telnet and ssh sessions between the two virtual machines. See how and why ssh is more secure using data collected from live sessions. Install a VPN to connecting the two workstations in the laboratory. Choose one VPN package from the following (note that some of these may not have distributions compatible with the version of Linux you are using):
• CIPE
• TINC
• SWAN
• SSH
• OPENVPN
• TUN

Your partner needs to use a different VPN package than you do. Create scripts that allow the VPN to be started and stopped with minimal effort. In the demonstrations be prepared to start, stop, and change VPN packages. Changing VPN packages will let your partner demonstrate their VPN after you do your demo. Be able to use Wireshark to show that the VPN is active and working correctly. Have your partner use another VPN. Note that a VPN needs to have a private IP address space in order to be a VPN. Simply using passwordless ssh is not sufficient.

Report:
1. Briefly explain what you did.
2. Explain how Wireshark works.
3. Explain the security differences between telnet and ssh. Include example traces.
4. Give the filter you use in Wireshark to collect the minimal1 amount of traffic necessary to grab the password from a given insecure application.
5. Explain how your VPN works.
6. Provide startup and shutdown scripts.
7. Contrast the efficiency of the VPN you set up with the VPN your partner set up. Provide data and statistical analysis to support your claim.

Demonstration:

1. Demonstrate to the instructor proficiency in using Wireshark. Be able to collect network traffic data and filter the data to maintain the minimal amount of information needed to compromise telnet or email traffic on the network segment.

2. Use Wireshark to show the security features of your VPN.

3. Start and stop your VPN.

Hints:

1. If you plan on waiting until the weekend before the assignment is due to start working on this, please drop the course now. There is no way you will be able to do the assignments.

2. The assignments are designed to have you think. It is expected that you will have questions and ask for advice. Allow yourself, and us, time for this to be done. It is unreasonable to expect the instructors to respond with advice on the last weekend before the assignment is due.

3. Rehearse your presentation so that it can be done in 5 minutes and show that you have done all that has been requested. That will also leave time for me to ask questions.

4. This assignment is much easier than the others. You want a good grade on this to make up for issues with the later assignments.

Reference no: EM133043459

Questions Cloud

Calculate the amount of arbitrage profit : Suppose that the current spot exchange rate is €1.50/£ and the one-year forward exchange rate is €1.60/£. Calculate the amount of arbitrage profit
Assignment on incentive programs : Under group and company-wide incentive programs, do you believe it is possible for poor performers to benefit without making substantial contributions to group
Method of authentication : Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one?
Disadvantage of being subjective and involves : 1. What type of appraisal method has a disadvantage of being subjective and involves individuals rating traits required for the job?
ECE 4490 Computer Network Security Assignment : ECE 4490 Computer Network Security Assignment Help and Solution, Clemson University - Assessment Writing Service
Prepare the journal entry to record the sale : Actual production in each year was: 2019 = 100,000 units; 2020 = 160,000 units; 2021 = 80,000 units. Prepare the journal entry to record the sale
What would be the value of this bond : A bond that matures in 15 years has a ?$1,000 par value. What would be the value of this bond if it paid interest? annually
Prepare a bank reconciliation for the month of july : The company's general ledger account had a balance of $41,143 at the end of July. Prepare a bank reconciliation for the month of July
What the property, plant and equipment turnover : The 2019 financial statements for Kostjuk Railway report the following information: What the property, plant and equipment turnover

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd