Sensitive or critical for business or military purposes

Assignment Help Basic Computer Science
Reference no: EM132511336

Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted. What does encrypted data look like? In this lab we will look at data which is unencrypted and data that is encrypted. We will use a tool called GNS3 to simulate two routers that are connected via a point-to-point link. We will run data through this link while looking at the packets going through it. The tool we will use to view the data is Wireshark which is probably the most important tool we as network engineers have in our toolbelt. Let's answer the following questions as we go through the lab.

1. What is the cleartext data that is being sent in the ping between the two PCs? _____________________

2. What is the protocol used for the ping utility? ____________________

3. How many ping messages do you see? _____________________ Why?

4. Is this data encrypted or unencrypted? _____________________________

5. Now let's make a change in the router. What types of messages do you see now? Does it look the same as the messages we saw before we made the change to the router? ________________________

6. What protocol do you see now? ____________________

7. Are you still able to see the source and destination MAC address? __________What layer is this you are looking at the MAC address in? _____________

8. Are you still able to see the source and destination IP address? __________What layer is this you are looking at the IP address in? _____________

9. Can you see the cleartext data you saw before? ____________________________

10. Explain the ESP protocol. Does what we see in Wireshark make sense? Write a paragraph answering these two questions.

Reference no: EM132511336

Questions Cloud

Safely share security data : we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad,
Information governance and data governance : Information Governance, IT Governance, Data Governance: What's the Difference? Briefly explain.
File inclusion vulnerability. : Do a bit if research into File Inclusion Vulnerability. What is the difference of low and remote inclusion?
Ibm advanced analytics : Check IBM Advanced Analytics. What tools were included that relate to this case? Check IBM cognitive buildings. How do they relate to this case?
Sensitive or critical for business or military purposes : Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted.
Data visualization workflow : Formulating your brief: planning, defining and initiating your project. Establishing your editorial thinking: defining what you will show your audience.
Implementing new interorganizational system : Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees,
Explicit strategies for technology development : Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity
Project selection and planning : Explain four methods for identifying and selecting IS projects. Identify the strengths and weaknesses of each method.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Prove that insertion sort will always produce a sorted array

The algorithm should return a stack containing the records in sorted order (with the least value being at the top of the stack). Your algorithm should be Θ(n 2 ) in the worst case.

  Software usability and navigation

Using your favorite search engine, perform a web search on the terms "software usability and navigation"

  Develop equivalence partitions and test cases

Develop equivalence partitions and test cases for the following items specified in the project description:

  Draws a simple face of the given size in win

Write and test a function to meet this specificationdrawFace(center, size, win) center is a Point, size is an int, and win is a GraphWin. Draws a simple face of the given size in win

  Modularized body mass index

Design a modularized Body Mass Index (BMI) Program which will calculate the BMI of a team player. The formula to calculate the BMI is as follows:

  Discuss about change management for erp system

You are a member of the human resources organization of a midsized manufacturing company that is implementing a new enterprise resource planning system.

  Page paper on compilers and interpreters

There are Java compilers and interpreters. Write a 3 page paper on compilers and interpreters (2-3 paragraphs on each topic). Your paper must include the following:

  Write a program to determine the length of bursts of zero

Write a program to determine the length of bursts of zero's in a list of N numbers stored in an List. The program should record the length of the bursts of zero

  Describe at least two different ways to represent the pieces

For each of the following, describe at least two different ways to represent the pieces of information as a collection of bits:-

  Interest on retirement savings

They believe that they can earn 7% interest on retirement savings.

  Change in the supply of money effected the economy

Choose an instance from the past 100 years of U.S. history where a change in the supply of money effected the economy.

  Prepare an issues paper - current aspect of e-commerce

You are required to prepare an issues paper (a discussion of views of 2000 words in length) relating to some current aspect of e-Commerce.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd