Test different attack and defense techniques

Assignment Help Computer Network Security
Reference no: EM131525177

Test different attack and defense techniques. Performing port scan

The goal of project (I) is to setup a virtual lab environment to test different attack and defense techniques.

This part of the project has the following requirements:

Test different attack and defense techniques. Performing port scan

- Install a hypervisor, I recommend VirtualBox, but feel free to use any other software such as VMWare
- Download virtual image ( not the installable image ) for the following tools: Kali Linux, Metaspliotable II, Windows 7
- Import all the three images into VirtaulBox
- Configure your hypervisor environment so that three virtual machines are on the same local network ( you should be able to ping each machine from the other )

- Use your Kali Linux machine to run a port scan over the Windows and Metasploitable machines

For the outcome of the project, you will be demonstrating the port scan

Reference no: EM131525177

Questions Cloud

What is the project initial investment outlay : Explain how net operating working capital is recovered at the end of a project's life, and why it is included in a capital budgeting analysis.
What is the projects operating cash flow for the first year : Nixon Communications is trying to estimate the first-year operating cash flow (at t 1) for a proposed project. The financial staff has collected the following.
Order to understand the financial condition of organization : Why is the balance sheet important in order to understand the financial condition of the organization?
What is the proper balance between freedom and protection : What is the proper balance between freedom and protection, and how should that balance be achieved
Test different attack and defense techniques : Test different attack and defense techniques. Performing port scan - environment to test different attack and defense techniques.
Principal role of a union in today : What is the principal role of a union in today's business environment?
What happens to the market price of a bond as the bond : Explain what happens to the market price of a bond as the bond approaches its maturity date. Explain in your own words the following bond relationship.
Challenges ensuring that the organizations : Human Resource managers face many challenges ensuring that the organizations they help cultivate are able deliver upon human.
Thoughts regarding president obama comments : What are your thoughts regarding President Obama's comments on workplace diversity? Provide a resource to validate your thoughts.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Securing and protecting information

Securing and Protecting Information

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Availability of the organizations information assets

Your plan must be in nontechnical terms to the user population that incorporates the confidentiality, integrity, and availability of the organization's information assets.

  How many intermediate authorities do they employ

How many intermediate authorities do they employ? How many certificates have they signed? Do not limit yourself to these questions, but provide a thorough overview of how the CA is run.

  What process you would use test the software security

Evaluate the extent to which programmers have the requisite experience to test the security of software within the development of a product. If not, explain what process you would use test the software security.

  Do viruses infect hardware and executable files

Since physical security is often managed under separate responsibility from information security, risk analysis for information security does not need to address physical security.

  How is your firewall implementation

Imagine you have installed and configured firewalls in all of the right places within your organization's network. Like any other organization, you try to stay current by deploying the latest and greatest in firewall technology.

  Is there any way that eve can read encrypted communications

Suppose that Eve runs a key server. Alice downloads a key from the key server which Eve claims is Bob's public key. Bob downloads a key from the key server which Eve claims is Alice's public key.

  How many keys are possible in such a cipher

Consider a transposition cipher that uses a five by five matrix and permutes the columns before reading them out.- How many keys are possible in such a cipher?

  What security protocols are implemented

MCD4700 - Your task is to collect data about WLAN access points and discuss several features of the network that you observe: What kind of technology has been deployed? How many different networks do you see? What channels do they use, do they pro..

  Describe the implementation of secure sockets layer

Describe the implementation of Secure Sockets Layer (SSL) in support of Hypertext Transfer Protocol Secure (HTTPS). Assess how you are assured that your browser is secure. Determine if the user data truly is protected or this is a false sense of s..

  Mitigating dos attacks against broadcast authentication

Mitigating DOS Attacks against Broadcast Authentication in Wireless Sensor Networks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd