What information might be gathered from an observed attack

Assignment Help Other Engineering
Reference no: EM132455211

This week's reading has to do with network traffic signatures, including using CVE to identify vulnerabilities, and how to identify attacks on a network. We will be looking at programs like Wireshark, and in-depth at how the TCP three-way handshake works. After reading the content for this week, answer the following questions, and then reply to at least two other posts.

Question 1: Let's discuss some legitimate uses of ping sweeps and port scans. For example, if you were to find yourself in charge of a network with little to no documentation, a ping sweep and port scan may be necessary to discover what services are running on the network. What other situations might a ping sweep or port scan have legitimate uses? Give specific examples, and whether any problems might occur because of these scans, and why.

Question 2: Some actual real-life monitoring and identifying traffic for various network communications. Use the Wireshark User's Guide to become familiar with using filters within Wireshark, download it to your computer, and run some scans. What are you seeing on the network? Give a brief writeup of what kind of traffic is on your network, and what it means. Please make sure you have permission to do this on whatever network you are using. IE: Don't use this at work without permission from whoever needs to grant it. You can use it wherever you'd like, whether at home, on a public wifi connection, or anywhere with network traffic to scan.

Question 3: Discuss what information might be gathered from an observed attack. For example, given the complexity of the attack, what could an administrator assume about the attacker? How might an administrator's defensive strategy to an attack change based on his or her perception of an attacker's skill?

Reference no: EM132455211

Questions Cloud

Prepare this assignment according to the apa guidelines : Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
Compare the variable and fixed overhead variance : Compare the variable overhead variance to the fixed overhead variance. Describe the two assumptions used in cost estimation behavior
Self-disclosure-gender and communication : Review the article entitled, "Can We Talk?" and Section 2.2 of our text titled "Biological Sex and Gender." Based on what you've learned in these readings
Examinee battles including both axis and allies strategies : Examine one or more major battles, including both the Axis and Allies strategies, the outcome of the battles, and the subsequent effects of the victory/defeat.
What information might be gathered from an observed attack : How might an administrator's defensive strategy to an attack change based on his or her perception of an attacker's skill?What information might be gathered
Explain in detail naturalism-inclusivism : Explain in detail Naturalism, Inclusivism, and Exclusivism from Hick's "Religious Pluralism and Salvation".
How effective is the instructional method for teaching : For this task, select three instructional methods or approaches that could be used to teach math and/or reading from the required readings or websites
Compute the flexible-budget variance : Actual purchases and usage for April 2012 were 22,000 pounds at $0.42 a pound. Compute the flexible-budget variance
Who was the most important composer of concert band music : Who was the most important composer of concert band music in the late 1800's? What three traits does his music share with Stephen Foster and George M. Cohan?

Reviews

Write a Review

Other Engineering Questions & Answers

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  Calculate the gasoline savings

How much gasoline do vehicles with the following fuel efficiencies consume in one year? Calculate the gasoline savings, in gallons per year, created by the following two options. Show all your work, and draw boxes around your answers.

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  Application of mechatronics engineering

Write an essay on Application of Mechatronics Engineering

  Growth chracteristics of the organism

To examine the relationship between fermenter design and operating conditions, oxygen transfer capability and microbial growth.

  Block diagram, system performance and responses

Questions based on Block Diagram, System Performance and Responses.

  Explain the difference in a technical performance measure

good understanding of Mil-Std-499 and Mil-Std-499A

  Electrode impedances

How did this procedure affect the signal observed from the electrode and the electrode impedances?

  Write a report on environmental companies

Write a report on environmental companies

  Scanning electron microscopy

Prepare a schematic diagram below of the major parts of the SEM

  Design a pumping and piping system

creating the pumping and piping system to supply cool water to the condenser

  A repulsive potential energy should be a positive one

Using the data provided on the webvista site in the file marked vdw.txt, try to develop a mathematical equation for the vdW potential we discussed in class, U(x), that best fits the data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd