Describe normal network traffic

Assignment Help HR Management
Reference no: EM133974030

Questions

IDENTIFY

List the hosts on your network and describe normal network traffic.

- What are the hosts on your network?

- What did normal/expected traffic look like on your network?

DETECT

Provide a brief description of the type of traffic you analyzed, including whether or not it was an attack.

- How did you determine what current network traffic looks like?

- What unusual activity did you find on the hosts?

- Who (which hosts) are the attacker(s) and the victim(s)?

- When did this occur(date/time)?

PROTECT

Provide your recommended mitigation.

- How did you identify the vulnerabilities on the victim host(s) that allowed this attack to occur?

- How did you mitigate (fix) the host's vulnerability?

RESPOND

Describe how you concluded this was malicious/attack traffic.

- How did you find the attack vectors?

- How did you stop the attack?

RECOVER

- Describe how the exploit could affect the system, specifically the function of each host/network node.

- How did you confirm that the problems are fixed and your network is safe and secure?

Reference no: EM133974030

Questions Cloud

Determination of densities : A special flask used in the determination of densities, called a pycnometer, has a mass of 15.384 g when empty,
What is meant by the term natural security : What is meant by the term natural security? Describe the concept of adaptability. Discuss how we failed to apply them for security management.
Hampered your mobile forensic investigations : You were tasked with creating a PowerPoint Presentation on at least three different challenges that have hampered your mobile forensic investigations
About the concept of the kill chain : You learned about the concept of the Kill Chain. Describing each of the stages of the Kill Chain.
Describe normal network traffic : List the hosts on your network and describe normal network traffic. What are the hosts on your network? How did you mitigate (fix) the host's vulnerability?
What settings should be controlled by system administrator : What settings should you allow users to change, and what settings should be controlled by the system administrator?
Metasploitable virtual machines : You and your red team members got your hacking lab running with the Kali and Metasploitable virtual machines.
Describe the major steps in privacy impact analysis : Describe the major steps in a privacy impact analysis. Explain the key concepts related to Elastic Load Balancing (ELB).
Define the stage of cyber operations : Define the stage of cyber operations in which you are currently operating.

Reviews

Write a Review

HR Management Questions & Answers

  Improve problem solving capabilities within organization

Types of teams as to their effectiveness that will improve problem solving capabilities within organizations.

  Influence tactics help in reducing organizations politics

Explain the different types of influence tactics that will be of a help “if adopted” in reducing the organizational politics.

  Report on citigroup''s hr service level agreement

Human Resources or Human Resource Management deals with HR Service Level Agreement. HR Service Level Agreement is an agreement made between the employer and the employee, which states that the employee would work under any client and sometimes any ti..

  A project report on hrm

Human Resource Management as the name suggests, it is a management discipline which deals with the human i.e. the workforce aspect of organizations. Need and practices of HRM are inevitable in present scenario of extreme competition where "Talent War..

  Hrp: recruitment and selection

Recruitment and Selection is the initial ladder of any Human Resource Planning process and contains an immense significance for any organisation.

  A project report on study of statutory complainces

Statutory compliance and its immense knowledge are crucial to be understood in an organization. It contains all the forms, procedures and acts applicable in a company.

  Operant conditioning and Reinforcement

Operant conditioning is a learning process where behaviour is controlled by its consequences. In this process an individual's behaviour can be modified through the use of positive or negative reinforcement.

  Effectiveness of training programs in achieving customers an

The main motive for conducting this research is to provide broad range of research of the literature and their reviews related to training and development and assisting the employees in providing customers satisfaction.

  A critical analysis of hr processes and practices in fedex c

FedEx is illustrious for its novel HR processes and practices that have greatly accounted for its success.

  Integrating culture and diversity in decision making

People in the organization are known as Google where they share common goals and have common vision.

  Impact of employee attrition on people management in organis

Talent management implies recognizing a person's inherent skills, traits, personality and offering him a matching job.

  Labour dissonance at maruti suzuki india limited: a case stu

This Case Study focuses on various issues related to Labour Unrest at Maruti Suzuki India Limited.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd