In what aspects could the tool be improved

Assignment Help Computer Network Security
Reference no: EM13527058

1) Select a tool from "Top 100 Network Security Tools". The use of an open-source tool is highly encouraged.

Cain and Abel

UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. For downloads and more information, visit the Cain and Abel homepage.

2) It is required that you install and run the tool in an enclosed network environment or use it on your own computer ONLY. An enclosed network environment means a non-operational networked system without any physical connection to other working computing environments (e.g., the Internet). Special attention should be paid when you use network scanners, sniffers, hacking tools or password crackers because their usage may violate an organization's security policies or compromise other computing resources. It is therefore your own responsibility to guarantee that the running of security tool(s) does not violate your organization's regulations, procedures, policies, and/or local, state and federal laws.

3) Follow the instructions to configure and run the tool you chose.

4) Write a brief report (2-3 pages, single-spaced, not counting quotations used). In your report, answer the following questions in your own words (please do not copy/paste from a tutorial or other online materials).

a) What is the functionality of the tool?

b) What is the actual running environment (software and hardware) of the tool?

c) How will you evaluate the tool based on your own experience?

d) In what aspects could the tool be improved?

Reference no: EM13527058

Questions Cloud

A mutation in a gene disrupts paracrine signaling : A mutation in a gene disrupts paracrine signaling from a subset of cells in the pancreas. Which of the following mutant phenotypes is consistent with the information above?
Define what is the molality of the solution : The density of a 20.3 M CH3OH (methanol) solution is 0.858 g/mL. What is the molality of this solution. H2O is the solvent.
Desired pollen for the hybrid corn : Removing unwanted male flowers so that female flowers on the same plant are pollinated by the desired pollen for the hybrid corn. What does this tell you about corn?
Compute delta g" for the autoionization of water : Calculate delta G" for the autoionization of water at 25" C. Kw = 1.0 × 10-14. A common name for methanol (CH3OH) is wood alcohol.
In what aspects could the tool be improved : What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?
An auditor at a prestigious cpa firm : An auditor at a prestigious CPA firm
Several bacterial strain lac operon genotypes : Fill in the blanks in the “lactose absent” and “lactose present” columns in this table. (+) means significant levels of active ß-galactosidase enzyme can be detected. (–) means no significant levels of active ß-galactosidase enzyme.
Compute the percent ionization of formic acid in solution : Calculate the percent ionization of formic acid (HCO2H) in a solution that is 0.311 M in formic acid and 0.189 M in sodium formate (NaHCO2). The Ka of formic acid is 1.77 × 10-4.
Evaluate the temperature of the tungsten filament : A common flashlight bulb is rated at 0.202 A and 3.82 V (the values of current and voltage under operating conditions, estimate the temperature of the tungsten filament when the bulb is turned on

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd