What is the display filter expression

Assignment Help Other Subject
Reference no: EM133106843

4064CEM Foundations of Cyber Security - Coventry University

Assignment:

Learning Outcome 1: Identify well-known security issues
Learning Outcome 2: Demonstrate how well-known security vulnerabilities can be both exploited and corrected

Tasks Description:

Task 1: Linux commands: all the tasks in Task 1 should be fulfilled via the Command Line Interface (CLI).

As a root, create a user with the username being ehcs2022. You chose your own password for this account. Then login as ehcs2022

Provide a command to go to your home directory. For the rest of the tasks, unless specified otherwise, you are supposed to be in your own home directory before you fulfil the tasks.

If for some reasons you failed to fulfil Task 1-(1), you can fulfil the rest of the tasks under any existing home directory on your Linux system.
Provide a command to show the current date.

Provide a command to display one-line description of df.

(i) Create a directory named myDir
(ii) Within myDir directory, create an empty file named myFile

(iii) Within myDir directory, use only one command to create the following empty files:
myFile1, myFile11, file2, file6, file12, file22, file33, file42

(iv) Within myDir directory, use an appropriate wildcard to copy all the files whose file names start with myFile to the parent directory

(v) Within myDir directory, use an appropriate wildcard to delete the following files in an interactive way (i.e. a confirmation is required before a file is deleted):
file12, file22, file42

(6) Display the kernel name and the kernel version of your Linux system.

(7) Create an alias called 'myhost' that echoes the hostname of your Linux system

(8) (i) Display the first 3 lines of /etc/passwd

(ii) Create a file named passwd.txt that stores the last 2 lines of /etc/passwd

Task 2: Information Gathering

(1) Use Google Advanced Operators to form a query that returns the following results:
(i) Web pages with "index of" in the title and "COVID-19" in the text

(ii) Web pages from www.indeed.co.uk that contain "cyber security" in their titles.

(iii) Web pages with "webcam" in the title and "login" in the URL link

(2) List two (2) Linux commands for obtaining IPv4 address of www.coventry.ac.uk

(3) List a Linux command that starts Apache HTTP Web server

(4) List a Linux command that display the running service(s) and the OS details of the local host.

Task 3: Use Wireshark to fulfil the tasks relevant to the traffic captured in in traffic-ResitDeferral.pcapng (available on material)

(1) What is the display filter expression so that only the HTTP traffic containing the IP address of 5.134.4.207 is shown?

(2) What is the client-side browser type?

(3) What is the web server name (Host) of 5.134.4.207?

(4) What Portable Document Format (PDF) document on the web server was accessed by the client?

Task 4: Hashing, symmetric cryptography and asymmetric cryptography are the techniques used for secure communication in the presence of third parties.
(1) explain how message integrity is provided, and list three existing algorithms for message integrity.

(2) provide the advantages and disadvantages of using symmetric cryptography and asymmetric cryptography for confidentiality, and explain how these two techniques can be combined in order to provide confidentiality with high performance

Attachment:- Cryptography.rar

Reference no: EM133106843

Questions Cloud

4063CEM The Security Professional Assignment : 4063CEM The Security Professional Assignment Help and Solution, Coventry University - Assessment Writing Service - Describe the concepts of threat
Determine the initial measurement of the bonds : On January 1, 2021, Luke Company issued its 9%, P5,000,000 face value bonds at a premium. Determine the initial measurement of the bonds
How much is the monthly payment : A loan of P30,000 is to be repaid monthly for 5 years that start at the end of 4 years. If interest rate is 12% converted monthly, how much is monthly payment
What is the appropriate cost for retained earnings : The return on the S&P 500 index is 12%. What is the appropriate cost for retained earnings in determining the firm's cost of capital
What is the display filter expression : Identify well-known security issues and Demonstrate how well-known security vulnerabilities can be both exploited - explain how message integrity is provided
Use common tools to enumerate networks and hosts : Relate current events in cybersecurity to the technological and theoretical aspects of their course and Use common tools to enumerate networks and hosts
Prepare the journal entries for sheffield : Sheffield completes installation on September 15, 2021, and the customer pays the balance due. Prepare the journal entries for Sheffield in 2021
What amount of interest expense should blossom report : In its 2021 income statement, what amount of interest expense should Blossom report from this lease transaction
What is the minimum amount that you would accept : Based on what you know today, what is the minimum amount that you would accept in exchange for the asset just before the payoff is revealed

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd