Investigate the existing network protocols

Assignment Help Computer Network Security
Reference no: EM133163330

Question:

You will:

1. investigate the existing network protocols
2. analyze the network attack
3. gather forensic data about the attack
4. prepare the incident report, identifying
- the attacker
- compromised server and service
- exploited vulnerability
- data breached
- your recommendations to strengthen the organization's network infrastructure

Begin by looking into how the network attack could have occurred by researching techniques attackers use to infiltrate a network such as denial of service, backdoor, botnet, and brute-force attacks.

The next step is to examine the latest network forensic analysis tools (NFAT). Then, you'll summarize the information you gathered from your research and include it in the first section of the incident report. This summary will provide the leaders in your organization with an understanding of how network attacks happen and how your organization's security operations team analyzes the network for vulnerabilities.

After that you've completed your research on network attacks and tools for network analysis, you're ready to go to the next step: analyzing the organization's incident response

Having conducted research on network attacks and network forensic analysis tools, you're ready to prepare for the investigation on this particular network intrusion. To do this, you'll learn how to gather network evidence from log files, network/server configuration, user accounts, and network infrastructure.

Once you have gathered the network evidence in this case, you'll incorporate it into the second section of your final incident report. As with the first section of your report, the audience for this section are the leaders in your organization who will need an overview of how the organization's security team gathers network evidence.

You will conduct packet sniffing with Wireshark to gather information about the attacker, determine the resources that may have been compromised during the attack, and learn how the attacker compromised the resources.

You will incorporate this written report into the third section of your incident report. This section-geared to the leaders, network administrators, and the security operations team in your organization-will provide them with detailed information about the network attack and vulnerabilities the organization needs to address.

You've conducted the network analysis using Wireshark and answered the forensic analysis questions in the written report. Now, you'll complete a forensic investigation report to document the results of the Wireshark analysis. Refer to the Guidelines for Digital Forensics Examiner Reports as needed. Your report will include screenshots and analysis of the following:
• packets
• server images
• log review
• user account and privilege escalation
• account weaknesses
You'll include this forensic investigation report as a part of your final incident report, which you will create in the next step.

You are confident that you've conducted a comprehensive network investigation and gathered the necessary information about the network attack and how to mitigate future attacks. You combine the results of Steps 1-4 to prepare a final incident report on the compromised network for your organization's leaders, network administrators, and security operations team.

Your report should include
- a summary of the field of network forensics, including attack techniques, attack vectors, and digital forensic tools and procedures for analyzing network traffic to understand how a network attack can occur (or could have occurred)
- your written report from the Wireshark virtual lab
- your forensic investigation report
- recommendations for network administrators to follow to harden their network infrastructure

Reference no: EM133163330

Questions Cloud

State a hypothesis for the happiness and engagement : State a hypothesis for the Happiness and Engagement Dataset from Part 1 of the Statistics Project - Review the steps beginning on p. 202 in Statistics Plain
Describe methodologies used while conducting research : Describe methodologies used while conducting research - You will summarize contents of books, articles, laws and/or regulations that have direct relevance
MGMT 441 Strategic Management Assignment : MGMT 441 Strategic Management Assignment Help and Solution, Southern Illinois University - Assessment Writing Service
Business continuity plan for review : Business Continuity Plan for Review - identify current systems and timelines that will be used to bring systems back online and the sequence of events
Investigate the existing network protocols : Researching techniques attackers use to infiltrate a network such as denial of service, backdoor, botnet, and brute-force attacks
Cultural issue between employees : Discuss the methodologies the organization will use to resolve any issues regarding employment laws and policies internally
Literature review paper project : Research paper - Introduce the necessary background information for the context of your argument - Using these tools may take a little time in the beginning
Evaluate the impact of organisation culture : Evaluate the impact of organisation culture, politics, stake-holder influence, social responsibility and ethical issues on corporate strategy assessment
Develop a project report for the smart city os project : Develop a project report for the Smart City OS project by leveraging the techniques and concepts you have covered in the module

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd