Reference no: EM131144818
Project Description
Analyze each file (Wireshark is probably the best tool to use for this) and answer the following questions:
Capture file #1: HTTP traffic
- List three website visited and their IP address
- List three search queries performed
Capture file #2: HTTPS traffic
Observe the first https protocol trace.
- What is the name of the certificate issuing authority?
- What encryption algorithm used?
- What is the key used during encryption? What is the key size ?
- What is the expiration date and time on the issued certificate?
- What is the complete cipher suite that the browser supports?
- What is the cipher suite that the server supports?
Capture file #3: FTP trace
- What is the login name and password used for connecting to the ftp server?
- What file(s) were downloaded? Give their complete download path and their sizes.
Capture file #4: Traceroute Traffic
Analyse the packets from the source IP "128.12.173.14".
- What is the target website for which the traceroute is run?
- List the IP addresses observed in the TraceRoute.
Capture file #5: POP3 Traceroute
- Give the login name and password used.
- How many e-mails was received by the account? Give details about the 'subject' field of each email.
Capture file #6: Attacker Activities
This file contains two steps that an attacker performed on a network.
- What the attacker is trying to find in the first step ?
- What the attacker is trying to find in the second step ?
- What is attacker's IP address ?
- What is the attacker target's IP address ?
- Was attacker's target running a webserver on his computer ?
- Was attacker's target accessible via SSH ?
The analyzation of the trace file has to be done. The trace file can be downloaded from https://jaferian.com/nyit/.
How an organization has implemented quality-related strategy
: Briefly describe how an organization has implemented a quality-related strategy that involves leadership, teamwork, governance, organizational culture, or other factors addressed this week.
|
Evaluate the efficiency of various recruitment sources
: Explain the impact of failing to address these challenges on human resource functions and hospital performance management. Evaluate the efficiency and effectiveness of various recruitment sources and selection methods.
|
Compare and contrast three types of households
: Discuss the factors (select two ) that comprise family decision making. Compare and contrast three types of households. Which household types have you experienced?
|
Communications and software revolution
: Martin Carnoy writes, "Thanks to a communications and software revolution, we are more 'connected' than ever before-by cell phone, e-mail, and video conferencing-yet more disconnected than in the past from social interaction" (49) Do you agree? Post ..
|
What is the name of the certificate issuing authority
: What is the login name and password used for connecting to the ftp server - What files were downloaded? Give their complete download path and their sizes.
|
Authoritative continuum for group decision-making
: Let’s discuss briefly the Participative – Authoritative Continuum for Group Decision-Making. Here is the range of options for making group decisions: Share problem with group, facilitate discussion, group consensus. You decide with personal informati..
|
What is the required policy mix
: What is the required policy mix? Use an IS-LM diagram to show your policy proposal.
|
Explain how the packaging you will use for your product
: Describe how your marketing efforts and marketing mix will change with each phase in the product life cycle and Explain how the packaging you will use for your product or service will add value.
|
Marketing-reposition product for more universal appeal
: Marketing: What is it about some very successful, ages-old products like Twinkies, Spam, Slim Jims, Spaghetti-O's and Tang that engender such strong feelings? Share your thoughts about such a product you've encountered and what you think the company ..
|