Create a page table that ranks the packet capture

Assignment Help Management Information Sys
Reference no: EM132240969

You are analyzing packet captures from a wireless network to assess if the captures pose a threat, what risks, if any.

For this assignment, analyze the packet captures provided by Wireshark by doing the following:

Go to the Wireshark Sample Captures site, and download the following:

wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic

wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample

nb6-hotspot.pcap Someone connecting to SFR's wireless community network

iscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0

wap_google.pcap contains two WSP request-response dialogs

Note: Only download these sample captures. Other captures may set off your computer's system defenses.

Use Wireshark to view and analyze the sample captures.

Create a 1-page table that ranks the packet captures from the highest to lowest threat. In your table provide the following for each packet capture:

Description of the traffic

Description of the risks, if any, the traffic poses to the wireless network

Countermeasures to take to secure network from any threat

Write a 1/2- to 1-page memo to management as a network security specialist explaining the following:

How you can distinguish hostile packet data from normal packet data

How you can recognize any attack signatures in the packets you analyze

Provide a rationale for ranking the packets as you did.

Reference no: EM132240969

Questions Cloud

Which role do you think you are best equipped to play : Which role would best help you become a successful change agent? Which role do you think you are best equipped to play? Give reasons for your choice.
Create a one-page table listing possible security threats : As a team, discuss likely threats against the network and decide on recommendations to harden the network.
What will the book value of this purchase : What will the book value of this purchase (exclude all other plant and equipment) be after its third year of use
Explain difference between high- and a low-context language : Explain the difference between a high- and a low-context language? What kinds of problems do you think that an individual from a low-context language.
Create a page table that ranks the packet capture : How you can distinguish hostile packet data from normal packet data. How you can recognize any attack signatures in the packets you analyze.
What were the company retained earnings : Company Y's balance sheet reported: Total Liabilities of $76.767 million. What were the Company Y's retained earnings
Organizational consequences for asian americans : What are some potential negative individual and organizational consequences for Asian Americans being perceived as a "model minority"?
Major difference between a sole proprietorship : In a paragraph explain the major difference between a sole proprietorship, partnership, corporation, S-corporation, and a Limited Liability Company.
What are the firm profit-maximizing price : What are the firm's profit-maximizing price, quantity and level of advertising?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What benefits does schaffer hope to achieve

What benefits does Schaffer hope to achieve from outsourcing its IT infrastructure - Describe the steps taken to develop the RFP and the role that an outside

  The recent threat to the security of an e-commerce operation

Research a solution to address the recent threat to the security of an e-commerce operation that you defined in Research Project.

  Develop a press release on the topic of patient access

Develop a press release on the topic of patient access to health data via the Blue Button Movement, which a client physician group recently joined.

  Plan of correction for improving ergonomic work status

Provide justification for your assessment and a plan of correction for improving ergonomic work status

  Summarize the policy and its purpose for management

Consider the organization where you work, or an organization where you would like to work if you are not currently employed.

  Explain how the web user interfaces help donors

Read case study titled, "Using the ‘Technology as Experience' Framework,".  Explain how the Web user interfaces help donors to make decisions

  How does state government data security breach information

The National Conference of State Legislatures (NCSL) Web site traces telecommunication and information technology state legislation.

  Which two techniques would you prefer to use and why

Review the fact finding techniques discussed in the Connolly text. Which "two" techniques would you prefer to use and why?

  What could the companies learn from each other

How the companies' EOC policies and practices create advantages or disadvantages for their sustainability and growth?What could the companies learn from each other?Which company would you find more attractive as a potential employee? Why?

  Prepare report on mobile application and erp system

Prepare report on Mobile application and ERP system

  Describe three options for organizational strategy

BZ400:Describe three (3) options for organizational strategy. Provide three (3) examples of companies that follow each of the selected strategies. Provide a description of how three (3) companies used their strategies for competitive advantage.

  How you will set up the servers to have redundancy

What logical protections you recommend- What measures you will take to protect against attack, What measures you will take to prevent attacks and What measures you will take to be notified that you are being attacked.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd