What is the name of the certificate issuing authority

Assignment Help Computer Network Security
Reference no: EM131144818

Project Description

Analyze each file (Wireshark is probably the best tool to use for this) and answer the following questions:

Capture file #1: HTTP traffic
- List three website visited and their IP address
- List three search queries performed

Capture file #2: HTTPS traffic
Observe the first https protocol trace.
- What is the name of the certificate issuing authority?
- What encryption algorithm used?
- What is the key used during encryption? What is the key size ?
- What is the expiration date and time on the issued certificate?
- What is the complete cipher suite that the browser supports?
- What is the cipher suite that the server supports?

Capture file #3: FTP trace
- What is the login name and password used for connecting to the ftp server?
- What file(s) were downloaded? Give their complete download path and their sizes.

Capture file #4: Traceroute Traffic
Analyse the packets from the source IP "128.12.173.14".
- What is the target website for which the traceroute is run?
- List the IP addresses observed in the TraceRoute.

Capture file #5: POP3 Traceroute
- Give the login name and password used.
- How many e-mails was received by the account? Give details about the 'subject' field of each email.

Capture file #6: Attacker Activities
This file contains two steps that an attacker performed on a network.
 - What the attacker is trying to find in the first step ?
 - What the attacker is trying to find in the second step ?
 - What is attacker's IP address ?
 - What is the attacker target's IP address ?
 - Was attacker's target running a webserver on his computer ?
 - Was attacker's target accessible via SSH ?

The analyzation of the trace file has to be done. The trace file can be downloaded from https://jaferian.com/nyit/.

Verified Expert

The work is for network security using Wireshark to trace the packet file. The file contains 6 packet capture files. Analyze each file (Wireshark is probably the best tool to use for this) for different parts of the same.

Reference no: EM131144818

Questions Cloud

How an organization has implemented quality-related strategy : Briefly describe how an organization has implemented a quality-related strategy that involves leadership, teamwork, governance, organizational culture, or other factors addressed this week.
Evaluate the efficiency of various recruitment sources : Explain the impact of failing to address these challenges on human resource functions and hospital performance management. Evaluate the efficiency and effectiveness of various recruitment sources and selection methods.
Compare and contrast three types of households : Discuss the factors (select two ) that comprise family decision making. Compare and contrast three types of households. Which household types have you experienced?
Communications and software revolution : Martin Carnoy writes, "Thanks to a communications and software revolution, we are more 'connected' than ever before-by cell phone, e-mail, and video conferencing-yet more disconnected than in the past from social interaction" (49) Do you agree? Post ..
What is the name of the certificate issuing authority : What is the login name and password used for connecting to the ftp server - What files were downloaded? Give their complete download path and their sizes.
Authoritative continuum for group decision-making : Let’s discuss briefly the Participative – Authoritative Continuum for Group Decision-Making. Here is the range of options for making group decisions: Share problem with group, facilitate discussion, group consensus. You decide with personal informati..
What is the required policy mix : What is the required policy mix? Use an IS-LM diagram to show your policy proposal.
Explain how the packaging you will use for your product : Describe how your marketing efforts and marketing mix will change with each phase in the product life cycle and Explain how the packaging you will use for your product or service will add value.
Marketing-reposition product for more universal appeal : Marketing: What is it about some very successful, ages-old products like Twinkies, Spam, Slim Jims, Spaghetti-O's and Tang that engender such strong feelings? Share your thoughts about such a product you've encountered and what you think the company ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd