Reference no: EM131146579
Information Security Management
Lab - WireShark
Overview
For this assignment, you will need to install the WireShark packet analyzer software on your laptop or desktop system. There are packages for both Windows and Apple operating systems.
You must have administrator level access. If you do not have access to a system that you can install this software, you must notify me immediately so I can assign you an alternate assignment. You may also install this in a virtual lab environment.
Review the instructions provided below:
1. Install Wireshark
https://www.wireshark.org/download.html
2. Watch the introduction video
https://www.wireshark.org/video/wireshark/introduction-to-wireshark/
3. Download the Wireshark Capture File...(ill send link to u once work is assigned).
4. Open the capture file in WireShark, analyze the capture file and only inspect the HTTP protocol.
Requirements
1. Determine what was being done via the HTTP protocol. Was the user sending an email, browsing a website, uploading a file, etc.? Write a brief summary explaining what the user was doing using the HTTP protocol.
2. List all file names that you can identify in the trace file.
THINGS TO BE COVERED
Summary explaining what was being done using HTTP.
List of files. (at least 5 file names)
Simulate compute-client and compute-server interaction
: Simulate compute-client and compute-server interaction, you don't have to run them on two physical machines. Instead, they can be run on two JVMs (Java Virtual Machines) on a single physical machine
|
What is the net income for this firm
: Building an Income statement. Lifetime, Inc. has sales of $585,000, costs of $273, 000, depreciation expense of $71,000, interest expense of $38,000, and a tax rate of 35%. What is the net income for this firm?
|
Internal processes helps build highly efficient organization
: Internal processes of a company contribute to the company's overall effectiveness. Identifying ways to improve internal processes helps build a highly efficient organization. Root causes need to be identified. Methods to identify root causes may requ..
|
Identify a current business news of your choice
: Identify a current business news of your choice and explain the effects that any TWO forces out of Porter's Five Forces have had on the incident reported in the news
|
List all file names that you can identify in the trace file
: Determine what was being done via the HTTP protocol. Was the user sending an email, browsing a website, uploading a file, etc.? Write a brief summary explaining what the user was doing using the HTTP protocol. List all file names that you can ident..
|
Find the best production mix of the bathtubs
: Marriott Tub Company manufactures two lines of bathtubs, called model A and model B.- Find the best production mix of the bathtubs.
|
How medical care should be delivered-role of the patient
: Abraham Verghese and Eric Dishman each have very different perspectives on how medical care should be delivered, the role of the patient, the role of the physician... Which of these two paradigms do you believe is more realistic? What do you see goin..
|
Increase in the debt to total assets ratio
: Holding all other factors constant, indicate whether each of the following signals generally good or bad news about a company.(a) Increase in earnings per share.(b) Increase in the current ratio.(c) Increase in the debt to total assets ratio.(d) Decr..
|
Prepare a fifteen minute presentation
: Managing People & Teams - Case Study Analysis and Presentation- you have been asked to elaborate on culture improvement initiatives.
|