What is occurring and the possible uses of the information

Assignment Help Basic Computer Science
Reference no: EM13770600

Questions:

1. Is the activity occurring in packets 1-6 abnormal, in and of itself (that is, before you look at everything else in the packet)? If so, provide an interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

2. Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

3. Is the activity occurring in packets 31-405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible consequences. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

4. Is the activity occurring in packets 528-530 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

5. Is the activity occurring in packets 904-973 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

6. Is the activity occurring in packets 991-1293 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

7. Is the activity occurring in packets 1309-1405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

8. Is the activity occurring in packets 1406 to the end of the packet capture abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

Reference no: EM13770600

Questions Cloud

Find the price at which the firm makes zero profits : Suppose that the cost function of a firm is C(q) = 10 + 3q + 0.1q 2 and that it operates under perfect competition. If p = 4, find the optimal quantity, the costs, the revenue and the profits. Find the price at which the firm makes zero profits, that..
Difference between a simple interest note and a simple disco : You decide to take out an ordinary interest loan of $30,000 at 4%, on a 90 day note. a.) In 45 days you decide to make a payment of $10,000 on the loan. What is your new principal? Explain how you got the answer. b.)How much did you pay at the end of..
What is the minimum bid per widget : A firm is considering bidding on a project to produce eight widgets per year for the next four years. In order to complete the project, the firm must lease facilities for $30,000 per year, purchase equipment that costs $100,000, as well as pay labour..
Yield-to-maturity of a bond with a finite maturity : The yield-to-maturity of a bond with a finite maturity date is a function of all of the following variables except:
What is occurring and the possible uses of the information : Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I ..
Create matrix of vulnerability attributes and system object : Create a Matrix of Vulnerability Attributes and System Object. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities.
How to assign the cost of direct labor to each job : What services does the firm oiler, what document or procedure do you use to collect the costs of services per formed for each customer and how to assign the cost of direct labor to each job?
What is the minimum-cost output : What is the minimum-cost output? What is this manufacturer's fixed cost, For each level of output, calculate the variable cost (VC). For each level of output except zero output, calculate the average variable cost (AVC), average total cost (ATC), a..
What is meant by a protective put : What is meant by a protective put? What position in call options is equivalent to a protective put?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd