In what aspects could the tool be improved

Assignment Help Computer Network Security
Reference no: EM13527058

1) Select a tool from "Top 100 Network Security Tools". The use of an open-source tool is highly encouraged.

Cain and Abel

UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. For downloads and more information, visit the Cain and Abel homepage.

2) It is required that you install and run the tool in an enclosed network environment or use it on your own computer ONLY. An enclosed network environment means a non-operational networked system without any physical connection to other working computing environments (e.g., the Internet). Special attention should be paid when you use network scanners, sniffers, hacking tools or password crackers because their usage may violate an organization's security policies or compromise other computing resources. It is therefore your own responsibility to guarantee that the running of security tool(s) does not violate your organization's regulations, procedures, policies, and/or local, state and federal laws.

3) Follow the instructions to configure and run the tool you chose.

4) Write a brief report (2-3 pages, single-spaced, not counting quotations used). In your report, answer the following questions in your own words (please do not copy/paste from a tutorial or other online materials).

a) What is the functionality of the tool?

b) What is the actual running environment (software and hardware) of the tool?

c) How will you evaluate the tool based on your own experience?

d) In what aspects could the tool be improved?

Reference no: EM13527058

Questions Cloud

A mutation in a gene disrupts paracrine signaling : A mutation in a gene disrupts paracrine signaling from a subset of cells in the pancreas. Which of the following mutant phenotypes is consistent with the information above?
Define what is the molality of the solution : The density of a 20.3 M CH3OH (methanol) solution is 0.858 g/mL. What is the molality of this solution. H2O is the solvent.
Desired pollen for the hybrid corn : Removing unwanted male flowers so that female flowers on the same plant are pollinated by the desired pollen for the hybrid corn. What does this tell you about corn?
Compute delta g" for the autoionization of water : Calculate delta G" for the autoionization of water at 25" C. Kw = 1.0 × 10-14. A common name for methanol (CH3OH) is wood alcohol.
In what aspects could the tool be improved : What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?
An auditor at a prestigious cpa firm : An auditor at a prestigious CPA firm
Several bacterial strain lac operon genotypes : Fill in the blanks in the “lactose absent” and “lactose present” columns in this table. (+) means significant levels of active ß-galactosidase enzyme can be detected. (–) means no significant levels of active ß-galactosidase enzyme.
Compute the percent ionization of formic acid in solution : Calculate the percent ionization of formic acid (HCO2H) in a solution that is 0.311 M in formic acid and 0.189 M in sodium formate (NaHCO2). The Ka of formic acid is 1.77 × 10-4.
Evaluate the temperature of the tungsten filament : A common flashlight bulb is rated at 0.202 A and 3.82 V (the values of current and voltage under operating conditions, estimate the temperature of the tungsten filament when the bulb is turned on

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  What do you see as the role of computer forensics in

question 1 what do you see as the role of computer forensics in recovering from cyber attacks?question 2 how might

  Difference between perception and reputation

Discuss the difference between perception and reputation and explain how can organizational perception affect IT reputation?

  What security features given by running special software

What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?

  Analysis of a small publishing company

A small magazine publisher wishes to determine the best combination of 2-possible magazines to print for the month of July. Backyard magazine, which he has published for years, is a contant seller.

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

  Explain why asynchronous i/o activity is a problem

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

  Ip security and attacksnbspbased on your understanding of

ip security and attacksnbspbased on your understanding of networking concepts create a 2- to 3-page report in a

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

  Discuss how this and other information security

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  Explain the security mechanisms available for a database

Explain the security mechanisms available for a database and how the data will be protected. List the SQL commands you will use to create your database tables. Note: Be sure that each table has at least ten records that you create so you will be ab..

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd