Explain the use of tools - the source of the tools

Assignment Help Computer Network Security
Reference no: EM132267744

Please read instructions

Assignment:

"You now have to analyze an actual attack stream. It's 3:00 am and the phone rings. The boss is worried that an incident has occurred because the overnight IDS crew is seeing some funny alerts on the ACID/BASE console of the company's snort Intrusion Detection System (IDS). Thankfully, a sniffer was configured on that segment of the network, so a complete packet capture of the time spanning the "event" was saved for analysis. Unfortunately, the security budget has been slashed due to the down economy, so the packet capture is all you have to work with for this analysis....or is it?

Write a three page lab report that details the steps took to analysis of this "event." If you use any special tools, explain the use of tools, the source of the tools, and the way the tools would be used to respond to this "event."

Attachment:- Scenario.rar

Reference no: EM132267744

Questions Cloud

Investing in a juice factory - a capital budgeting analysis : FC 12-2 - Managerial Finance - MAJAN COLLEGE (UNIVERSITY COLLEGE) - What would be the impact on NPV and IRR if the "worst case scenario" occurs
Implement the socket program : implement encryption functionality in your code, especially in regard to data in transit i.e. network communications - written in the Java programming language
Write essay on criminal justice : Write essay on Criminal Justice
Why is this stressor a priority for you : GNED137 A Wellness Approach to Stress Management - Centennial College - Priority Stressor: (Identified and Explained) - Identify at least 2 possible barriers
Explain the use of tools - the source of the tools : The security budget has been slashed due to the down economy, so the packet capture is all you have to work with for this analysis....or is it
Define the project scope and constraints : Define the Project Scope and Constraints and Perform Fact finding:Create a User Survey or Questionnaire - Define the Project Scope and Constraints
Address the issues raised by stakeholders : Why is it important to communicate with and address the issues raised by stakeholders? Why is it important not to dismiss views of negative stakeholders?
Example of a project scope statement : Can you give an example of a project scope statement, consideration of Life-Cycle Phases and participant roles
Project manager for a website update project : You are the project manager for a website update project. The project is to take the current library website from its current dated design to a modern

Reviews

inf2267744

8/31/2019 2:55:24 AM

I just wanted to make sure that the writer will be hired should be familiar with my assignment request. The writer must be familiar with analyzing the Pcap file with Wireshark then only hire the writer. I need good quality work.

Write a Review

Computer Network Security Questions & Answers

  List the global locations where the systems will be housed

Design a Detailed Network Diagram for a Distributed System. List the global locations where the systems will be housed.

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  Difference between a security policy and a security plan

Discuss the difference between a security policy and a security plan

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Different logon passwords to be five upper-case letters

Computer system 1 needs logon passwords to be five upper-case letters. How many different passwords are there for system 1?

  Discuss the business requirement for UVW

MN502 Overview of Network Security Assessment - Analysis of network security tools. Discuss the business requirement for UVW in terms of their security

  What is the role of data mining

What is the role of data mining

  Write udp programs to establish communication channel

Write UDP programs allowing two parties to establish a secure communication channel. For simplicity, let us call the programs "Host" and "Client", which are executed by Alice and Bob, respectively.

  Research the debate over activex controls

Using the Web, research the debate over ActiveX controls and analyze Microsoft's security design. Is it strong enough? What security breaches have occurred in the past regarding ActiveX controls?

  Assignment on evaluating access control methods

Assignment On Evaluating Access Control Methods, Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of acc..

  How many possible keys are embodied in the final cipher text

How many possible keys are embodied in the final cipher text? - how many possible keys are embodied in the resulting double-encrypted cipher text?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd