What is occurring and the possible uses of the information

Assignment Help Basic Computer Science
Reference no: EM13770600

Questions:

1. Is the activity occurring in packets 1-6 abnormal, in and of itself (that is, before you look at everything else in the packet)? If so, provide an interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

2. Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

3. Is the activity occurring in packets 31-405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible consequences. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

4. Is the activity occurring in packets 528-530 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

5. Is the activity occurring in packets 904-973 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

6. Is the activity occurring in packets 991-1293 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

7. Is the activity occurring in packets 1309-1405 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

8. Is the activity occurring in packets 1406 to the end of the packet capture abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I KNOW that. What I want is an interpretation of what all that means, and how it might be used as an intruder to gain access to a protected system.

Reference no: EM13770600

Questions Cloud

Find the price at which the firm makes zero profits : Suppose that the cost function of a firm is C(q) = 10 + 3q + 0.1q 2 and that it operates under perfect competition. If p = 4, find the optimal quantity, the costs, the revenue and the profits. Find the price at which the firm makes zero profits, that..
Difference between a simple interest note and a simple disco : You decide to take out an ordinary interest loan of $30,000 at 4%, on a 90 day note. a.) In 45 days you decide to make a payment of $10,000 on the loan. What is your new principal? Explain how you got the answer. b.)How much did you pay at the end of..
What is the minimum bid per widget : A firm is considering bidding on a project to produce eight widgets per year for the next four years. In order to complete the project, the firm must lease facilities for $30,000 per year, purchase equipment that costs $100,000, as well as pay labour..
Yield-to-maturity of a bond with a finite maturity : The yield-to-maturity of a bond with a finite maturity date is a function of all of the following variables except:
What is occurring and the possible uses of the information : Is the activity occurring in packets 9-18 abnormal? If so, provide a detailed interpretation of what is occurring, and the possible uses of the information gained. You don't have to tell me IP xx.xx.xx.xx is accessing port x on IP xx.xx.xx.xx. I ..
Create matrix of vulnerability attributes and system object : Create a Matrix of Vulnerability Attributes and System Object. A policy to protect the infrastructure must be developed to identify threats and locate vulnerabilities.
How to assign the cost of direct labor to each job : What services does the firm oiler, what document or procedure do you use to collect the costs of services per formed for each customer and how to assign the cost of direct labor to each job?
What is the minimum-cost output : What is the minimum-cost output? What is this manufacturer's fixed cost, For each level of output, calculate the variable cost (VC). For each level of output except zero output, calculate the average variable cost (AVC), average total cost (ATC), a..
What is meant by a protective put : What is meant by a protective put? What position in call options is equivalent to a protective put?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining paper on reconnaissance planning

Write a paper on reconnaissance planning. The paper is explaining the network and reconnaissance plan.

  Return string made of the first n characters of the string

Given a string and an int n, return a string made of the first n characters of the string, followed by the first n-1 characters of the string, and so on

  Which approach do you favor and why

There are two primary approaches to measuring financial returns on IT investments: 1) Total Cost of Ownership (TCO) and 2) Return on Investment (ROI). Describe each of these approaches and analyze the advantages and disadvantages of each with a fo..

  Demonstrate an ability to communicate ideas

What kind of study does the question suggest (empirical--e.g., ethnography, case study, descriptive study, experimental; historical--oral or archival or both; theoretical; discourse or textual analysis, etc.) -  What data do you need to collect

  Under what circumstances will it fail

will the above function compile in C++? Is it correct? Under what circumstances will it fail and how should it be corrected?

  Define a class called blogentry

Define a class called BlogEntry that could be used to store an entry for a Web log. The class should have instance variables to store the poster's username, text of the entry, and the date of the entry using the Date class.

  Community supported agriculture

Your Community Supported Agriculture (CSA) farm delivers a box of fresh fruits and vegetables to your house once a week. For this programming project, define the class BoxOfProduce that c o n t a i n s exactly three bundles of fruits or vegetab..

  Find the standard sop

Find the standard SOP (sum of product) and POS (product of sum) expression of the subsequent Boolean function. F(A,B,C,D) = A(B' + CD') + A'BC'

  Write the definition of the function

Write the definition of the function, leavesCount, that takes as a parameter a pointer to the root node of a binary tree and returns the number of leaves in a binary tree. Add this function to the class binaryTreeType and create a program to test ..

  Design and implement a java program

Design and implement a Java program that will read a file containing numbers and compute the following statistics: the range (low, high), the average and the median (middle number).

  The total last year sales converted in mexican pesos

Using nested queries (correlated query) to display the total Last Year Sales converted in Mexican pesos that occurred in July 1, 2005. Only nested/correlated queries will be accepted. Round the result set to two decimal places Unit10_ConvertedCommiss..

  Explain the uses and advantages of the chips

Explain the uses and advantages of the chips. Mention likely privacy objections and refute them - making a presentation to a large retail chain to convince them to buy the chips to install in their products.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd