How to create a virtual machine

Assignment Help Computer Network Security
Reference no: EM132177023

How to create a virtual machine and install Linux Mint within the 'VM.' This lecture explains how to install and use VMWare on your host machine. What a COOL thing it is to be able to run multiple operating systems, even multiple NETWORKS on your desktop!

Introduction to computer and network security:

Why it's important, security problems, types of 'attacks,' CIANA.

Risk analysis:

Defining assets in a risk analysis, identifying threats and the likelihood of the threats occurring, identifying the consequences of a threat occurring, and vulnerabilities that increase risk.

Also covers common safeguards to reduce the impact of threats, securing equipment/data, and incident response (should be included in security policy).

Authentication:

Types of authentication, biometrics, detailed explanation of password hashing, examples of bad password choices, password cracking methods, network access controls, and coverage of password security on Unix and Windows systems.

Access control

This module covers access control, including discretionary, mandatory, rule-based, etc. I also demonstrate how to create a hierarchical layer of discretionary access control.

Password auditing:

Review of Unix password security, differences in hashing algorithms, reasons for conducting a password audit, extensive coverage of John the Ripper software, and an overview of rainbow tables.

Project: Password Policies and Auditing

Network Security: Packet Capture Analysis

1. Review of TCP/IP:

TCP/IP fundamentals, the OSI model, TCP vs UDP, application protocols, IP addressing, NAT, and an overview of proxy servers.

2. Network signature analysis:

Signature analysis, brief introduction to the Snort IDS, analysis of ICMP packet capture, common TCP/UDP ports, network baselining, the TCP 3-way handshake, and review of TCP flags.

3. Network signature analysis example:

ARP Spoofing

4. Honeypots

A honeypot is a computer security system used to detect, deflect, or, in some manner, counteract attempts at unauthorized use of an information system or computer. In this video I discuss honeypots and how they are used to defend your network. In particular the technology is useful for identifying and monitoring insider threats, which is the number one threat vector for most networks.

Firewalls

Introduction to Firewalls:

An explanation of firewalls, types of firewalls, stateless vs stateful filtering, placement of firewalls within a network, examples of firewall rules, and the importance of having an established security policy.

In the readings you will learn about DMZs and proxy servers.

Creating a host-only network in VMWare:

Create a network in VMWare for a host-only network (i.e., not connected to the Internet, great for running security and forensics sensitive experiments).

Attachment:- Assignment.rar

Reference no: EM132177023

Questions Cloud

Formation of expectations and long-term rates : What are the effects of the recent rise in risk and uncertainty on the formation of expectations and long-term rates?
Why giving tote bags make financial sense for organization : An organization that raises money to provide meals for seniors gives tote bags to its donors. Sami thinks it is wasteful to spend donated money on tote bags.
Analyze the macro-environmental forces : Analyze the macro-environmental forces that have caused Braun Buffel to deviate from its traditional retailing concept.
Write a literature review outline : Create a header for each theme, and place the appropriate resource citation(s) with its description under it as a sub-point to the relevant theme.
How to create a virtual machine : How to create a virtual machine and install Linux Mint within the 'VM.' This lecture explains how to install and use VMWare on your host machine
Economy to increase its production capabilities : Explain the requirements for an economy to increase its production capabilities (economic growth).
How do you see these issues affecting organizations : What are some of the current issues that affect Organizations in Canada? How do you see these issues affecting organizations?
Management matter of concern for both employers and union : Why are the rights of management a matter of concern for both employers and union.
Who did you work with to accomplish the planning : Who did you work with to accomplish the planning in the environment, and how did your connection with them help shape your proposal?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

  What recommendations would you make to management

As network administrator, how would you have addressed this scenario? What recommendations would you make to management?

  What can it do to improve its situation

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4.

  What is the correct command syntax to force gpo settings

What is the correct command syntax to force GPO settings? Why is it important to set a strict password policy as part of your security template?

  What are service level agreements

What are Service Level Agreements (SLAs) and why are they a critical component of any IT Outsourcing agreements?

  Design a voice network that meets west consultings needs

Design a voice and video network that meets West Consulting's needs, including annotations that highlight how traffic concerns will be addressed.

  Describe best practices in cybersecurity

Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Describe best practices in cybersecurity.

  Prepare a presentation about wireless attacks

Prepare a Presentation about Wireless attacks. Detailed description of the area researched, Technology involved in the area and Future trends in the area.

  Summarize differences and similarities between wep and wpa

Summarize the main differences and similarities between WEP and WPA. Is one considered more secure than the other? Why or why not? Please explain.

  Explore traffic behavior when designing a network

Why is it important to explore traffic behavior when designing a network? What problems could arise if you do not understand traffic behavior when you build a new network or upgrade a network?

  Design a logical topographical layout of current network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.

  How processing proceeds when a packet is received

A replay attack is one in which an attacker obtains. How processing proceeds when a packet is received and explain how this counters the replay attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd