What is the name of the certificate issuing authority

Assignment Help Computer Network Security
Reference no: EM131144818

Project Description

Analyze each file (Wireshark is probably the best tool to use for this) and answer the following questions:

Capture file #1: HTTP traffic
- List three website visited and their IP address
- List three search queries performed

Capture file #2: HTTPS traffic
Observe the first https protocol trace.
- What is the name of the certificate issuing authority?
- What encryption algorithm used?
- What is the key used during encryption? What is the key size ?
- What is the expiration date and time on the issued certificate?
- What is the complete cipher suite that the browser supports?
- What is the cipher suite that the server supports?

Capture file #3: FTP trace
- What is the login name and password used for connecting to the ftp server?
- What file(s) were downloaded? Give their complete download path and their sizes.

Capture file #4: Traceroute Traffic
Analyse the packets from the source IP "128.12.173.14".
- What is the target website for which the traceroute is run?
- List the IP addresses observed in the TraceRoute.

Capture file #5: POP3 Traceroute
- Give the login name and password used.
- How many e-mails was received by the account? Give details about the 'subject' field of each email.

Capture file #6: Attacker Activities
This file contains two steps that an attacker performed on a network.
 - What the attacker is trying to find in the first step ?
 - What the attacker is trying to find in the second step ?
 - What is attacker's IP address ?
 - What is the attacker target's IP address ?
 - Was attacker's target running a webserver on his computer ?
 - Was attacker's target accessible via SSH ?

The analyzation of the trace file has to be done. The trace file can be downloaded from https://jaferian.com/nyit/.

Verified Expert

The work is for network security using Wireshark to trace the packet file. The file contains 6 packet capture files. Analyze each file (Wireshark is probably the best tool to use for this) for different parts of the same.

Reference no: EM131144818

Questions Cloud

How an organization has implemented quality-related strategy : Briefly describe how an organization has implemented a quality-related strategy that involves leadership, teamwork, governance, organizational culture, or other factors addressed this week.
Evaluate the efficiency of various recruitment sources : Explain the impact of failing to address these challenges on human resource functions and hospital performance management. Evaluate the efficiency and effectiveness of various recruitment sources and selection methods.
Compare and contrast three types of households : Discuss the factors (select two ) that comprise family decision making. Compare and contrast three types of households. Which household types have you experienced?
Communications and software revolution : Martin Carnoy writes, "Thanks to a communications and software revolution, we are more 'connected' than ever before-by cell phone, e-mail, and video conferencing-yet more disconnected than in the past from social interaction" (49) Do you agree? Post ..
What is the name of the certificate issuing authority : What is the login name and password used for connecting to the ftp server - What files were downloaded? Give their complete download path and their sizes.
Authoritative continuum for group decision-making : Let’s discuss briefly the Participative – Authoritative Continuum for Group Decision-Making. Here is the range of options for making group decisions: Share problem with group, facilitate discussion, group consensus. You decide with personal informati..
What is the required policy mix : What is the required policy mix? Use an IS-LM diagram to show your policy proposal.
Explain how the packaging you will use for your product : Describe how your marketing efforts and marketing mix will change with each phase in the product life cycle and Explain how the packaging you will use for your product or service will add value.
Marketing-reposition product for more universal appeal : Marketing: What is it about some very successful, ages-old products like Twinkies, Spam, Slim Jims, Spaghetti-O's and Tang that engender such strong feelings? Share your thoughts about such a product you've encountered and what you think the company ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cloud computing security policy

A small non-profit organization (SNPO-MC) has received a grant which will pay 90% of its cloud computing costs for a five year period. But, before it can take advantage of the monies provided by this grant, it must present an acceptable cloud comp..

  Case study- ping sweeps and port scans

Case Study: Ping Sweeps and Port Scans, Your boss has just heard about some nefarious computer activities called ping sweeps and port scans

  Research paper on the privacy and on financial services

You need to work on the privacy and on financial services. For example Mint, Its an app also online access to keep track of your financial use in a month.

  Explain the added challenges of securing wireless devices

Explain the added challenges of securing wireless devices versus securing LAN-connected devices. Imagine you are starting a new small- to-midsized cybercafe business from the ground up. Explain which areas of your network would be LAN based and wh..

  Describe risk-related issues associated with cloud computing

Isn't hard to appreciate something when criminals continue to take advantage of this resource. Shirin and class, according to chapter 1, please describe the risk-related issues associated with cloud computing?

  Differences between symmetric and asymmetric encryption

Describe the differences between symmetric and asymmetric encryption. Select the encryption method you believe is typically more reliable of the two and explain why. Determine if there are any situations where the typically less reliable method co..

  What ethical issues surround using honeypot to trick attacks

Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think?

  Explain the role of intelligence in cyber security

explain the role of intelligence and counterintelligence in cyber security. Your explanation should include both the defensive and offensive aspect; policies that support or interfere; and suggestions, based upon what you have learned in class, t..

  Explain how you came up with your encoding and decoding

Show your work here and explain how you came up with your encoding and decoding. If you want to reverse engineer an instruction the MARS assembler shows you the encoding of all assembled instructions.

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Describe specific goals for the process area

Briefly describe what the process area is and why it is needed. Enumerate improvements you expect to see for these process areas in your enterprise.

  Wat issues need to be considered when planning an

common data formats are critical to being able to exchange data quickly and smoothly. establishing the standards for

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd