What is occurring and the possible uses of the information

Assignment Help Basic Computer Science
Reference no: EM13770600

Questions:

1. Is the activity occurring in packets 1-6 abnormal, in and of itself (that is, before you look at everything else in the packet)? If so, provide an interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

2. Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

3. Is the activity occurring in packets 31-405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible consequences. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

4. Is the activity occurring in packets 528-530 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

5. Is the activity occurring in packets 904-973 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

6. Is the activity occurring in packets 991-1293 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

7. Is the activity occurring in packets 1309-1405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

8. Is the activity occurring in packets 1406 to the end of the packet capture abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

Reference no: EM13770600

Questions Cloud

Find the price at which the firm makes zero profits : Suppose that the cost function of a firm is C(q) = 10 + 3q + 0.1q 2 and that it operates under perfect competition. If p = 4, find the optimal quantity, the costs, the revenue and the profits. Find the price at which the firm makes zero profits, that..
Difference between a simple interest note and a simple disco : You decide to take out an ordinary interest loan of $30,000 at 4%, on a 90 day note. a.) In 45 days you decide to make a payment of $10,000 on the loan. What is your new principal? Explain how you got the answer. b.)How much did you pay at the end of..
What is the minimum bid per widget : A firm is considering bidding on a project to produce eight widgets per year for the next four years. In order to complete the project, the firm must lease facilities for $30,000 per year, purchase equipment that costs $100,000, as well as pay labour..
Yield-to-maturity of a bond with a finite maturity : The yield-to-maturity of a bond with a finite maturity date is a function of all of the following variables except:
What is occurring and the possible uses of the information : Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I ..
Create matrix of vulnerability attributes and system object : Create a Matrix of Vulnerability Attributes and System Object. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities.
How to assign the cost of direct labor to each job : What services does the firm oiler, what document or procedure do you use to collect the costs of services per formed for each customer and how to assign the cost of direct labor to each job?
What is the minimum-cost output : What is the minimum-cost output? What is this manufacturer's fixed cost, For each level of output, calculate the variable cost (VC). For each level of output except zero output, calculate the average variable cost (AVC), average total cost (ATC), a..
What is meant by a protective put : What is meant by a protective put? What position in call options is equivalent to a protective put?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the sum of the squares of the integers

Find the sum of the squares of the integers from 1 to My Square, where My Square is input by the user.be sure to check that the user enters a positive integer.

  Write a phone book program

When phone book enties are displayed all data members will be displayed. Create a friend function that overloads the

  Write a program that reads a number n

Write a program that reads a number n from the keyboard and then reads n2 integers into an n-by-n two dimensional array and checks to see if the numbers form a magic square.

  How many time is the loop body of the while statement

Assume that all variables are of type int. z = 0; g = 0; s = 0; i = 0; while (i = 0) g = g + 1; else z = z + 1; i = i + 1; } 1.How many time is the loop body of the while statement executed?

  Devise an algorithm for multiplying two large numbers

Suppose you have available a pocket calculator that can multiply a four-figure number by a four-figure number and get the correct eight-figure answer

  The u.s. convert to a zero personal income tax

The U.S. Convert to a Zero Personal Income Tax

  Automated emails from google apps spreadsheet ?

How to send automated emails from google apps spreadsheet ?

  Explain chain of custody is critical factor for cases

Think of numerous cases where evidence could potentially be tampered with a cell phone or thumb drive. What can go wrong?

  Write a complete c++ program that reworks your cellular bill

Write a complete C++ program that reworks your Cellular Bill calculation program from Chapter 4. Give your source file a meaningful name, such as CellBillFun.cpp.

  Explain how fuzz based systems work

Explain how fuzz based systems work and provide a detailed example of a system that utilises fuzzy logic.

  Application development and programming languages

Compare and contrast object-oriented languages (Java, C++, C#, etc.) to imperative languages (C, Pascal, etc.) in terms of: Programmability, Maintainability, Performance, Development tools

  Develop a c program

Develop a C program. The program should implement and test the following function: uint countOnes(uint hexNumber); The function will return the number of one bits in hexNumber.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd