Create a page table that ranks the packet capture

Assignment Help Management Information Sys
Reference no: EM132240969

You are analyzing packet captures from a wireless network to assess if the captures pose a threat, what risks, if any.

For this assignment, analyze the packet captures provided by Wireshark by doing the following:

Go to the Wireshark Sample Captures site, and download the following:

wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic

wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample

nb6-hotspot.pcap Someone connecting to SFR's wireless community network

iscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0

wap_google.pcap contains two WSP request-response dialogs

Note: Only download these sample captures. Other captures may set off your computer's system defenses.

Use Wireshark to view and analyze the sample captures.

Create a 1-page table that ranks the packet captures from the highest to lowest threat. In your table provide the following for each packet capture:

Description of the traffic

Description of the risks, if any, the traffic poses to the wireless network

Countermeasures to take to secure network from any threat

Write a 1/2- to 1-page memo to management as a network security specialist explaining the following:

How you can distinguish hostile packet data from normal packet data

How you can recognize any attack signatures in the packets you analyze

Provide a rationale for ranking the packets as you did.

Reference no: EM132240969

Questions Cloud

Which role do you think you are best equipped to play : Which role would best help you become a successful change agent? Which role do you think you are best equipped to play? Give reasons for your choice.
Create a one-page table listing possible security threats : As a team, discuss likely threats against the network and decide on recommendations to harden the network.
What will the book value of this purchase : What will the book value of this purchase (exclude all other plant and equipment) be after its third year of use
Explain difference between high- and a low-context language : Explain the difference between a high- and a low-context language? What kinds of problems do you think that an individual from a low-context language.
Create a page table that ranks the packet capture : How you can distinguish hostile packet data from normal packet data. How you can recognize any attack signatures in the packets you analyze.
What were the company retained earnings : Company Y's balance sheet reported: Total Liabilities of $76.767 million. What were the Company Y's retained earnings
Organizational consequences for asian americans : What are some potential negative individual and organizational consequences for Asian Americans being perceived as a "model minority"?
Major difference between a sole proprietorship : In a paragraph explain the major difference between a sole proprietorship, partnership, corporation, S-corporation, and a Limited Liability Company.
What are the firm profit-maximizing price : What are the firm's profit-maximizing price, quantity and level of advertising?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd