What is the name of the certificate issuing authority

Assignment Help Computer Network Security
Reference no: EM131144818

Project Description

Analyze each file (Wireshark is probably the best tool to use for this) and answer the following questions:

Capture file #1: HTTP traffic
- List three website visited and their IP address
- List three search queries performed

Capture file #2: HTTPS traffic
Observe the first https protocol trace.
- What is the name of the certificate issuing authority?
- What encryption algorithm used?
- What is the key used during encryption? What is the key size ?
- What is the expiration date and time on the issued certificate?
- What is the complete cipher suite that the browser supports?
- What is the cipher suite that the server supports?

Capture file #3: FTP trace
- What is the login name and password used for connecting to the ftp server?
- What file(s) were downloaded? Give their complete download path and their sizes.

Capture file #4: Traceroute Traffic
Analyse the packets from the source IP "128.12.173.14".
- What is the target website for which the traceroute is run?
- List the IP addresses observed in the TraceRoute.

Capture file #5: POP3 Traceroute
- Give the login name and password used.
- How many e-mails was received by the account? Give details about the 'subject' field of each email.

Capture file #6: Attacker Activities
This file contains two steps that an attacker performed on a network.
 - What the attacker is trying to find in the first step ?
 - What the attacker is trying to find in the second step ?
 - What is attacker's IP address ?
 - What is the attacker target's IP address ?
 - Was attacker's target running a webserver on his computer ?
 - Was attacker's target accessible via SSH ?

The analyzation of the trace file has to be done. The trace file can be downloaded from https://jaferian.com/nyit/.

Verified Expert

The work is for network security using Wireshark to trace the packet file. The file contains 6 packet capture files. Analyze each file (Wireshark is probably the best tool to use for this) for different parts of the same.

Reference no: EM131144818

Questions Cloud

How an organization has implemented quality-related strategy : Briefly describe how an organization has implemented a quality-related strategy that involves leadership, teamwork, governance, organizational culture, or other factors addressed this week.
Evaluate the efficiency of various recruitment sources : Explain the impact of failing to address these challenges on human resource functions and hospital performance management. Evaluate the efficiency and effectiveness of various recruitment sources and selection methods.
Compare and contrast three types of households : Discuss the factors (select two ) that comprise family decision making. Compare and contrast three types of households. Which household types have you experienced?
Communications and software revolution : Martin Carnoy writes, "Thanks to a communications and software revolution, we are more 'connected' than ever before-by cell phone, e-mail, and video conferencing-yet more disconnected than in the past from social interaction" (49) Do you agree? Post ..
What is the name of the certificate issuing authority : What is the login name and password used for connecting to the ftp server - What files were downloaded? Give their complete download path and their sizes.
Authoritative continuum for group decision-making : Let’s discuss briefly the Participative – Authoritative Continuum for Group Decision-Making. Here is the range of options for making group decisions: Share problem with group, facilitate discussion, group consensus. You decide with personal informati..
What is the required policy mix : What is the required policy mix? Use an IS-LM diagram to show your policy proposal.
Explain how the packaging you will use for your product : Describe how your marketing efforts and marketing mix will change with each phase in the product life cycle and Explain how the packaging you will use for your product or service will add value.
Marketing-reposition product for more universal appeal : Marketing: What is it about some very successful, ages-old products like Twinkies, Spam, Slim Jims, Spaghetti-O's and Tang that engender such strong feelings? Share your thoughts about such a product you've encountered and what you think the company ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Udp and tcp use 1s complement for their checksums

Suppose you have the following 2 bytes: 01011100 and 01010110. What is the 1s complement of the sum of these 2 bytes?

  Network security structure

After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability.

  Prepare a power point presentation on the tallinn manual

Prepare a power point presentation on the Tallinn Manual. The assignment shall include a paper of not less than 12 pages . Paper should be an APA format, double spaced, and contain at least 20 references.

  What is the impact of not having diagrams that describe the

What is the impact of not having diagrams that describe the program?

  Program that automatically decrypts ciphertexts

Write a program that automatically decrypts ciphertexts that have been created using the kind of monoalphabetic substitution illustrated by the first problem set. This is an interesting project, but it is also much harder than you might expect.

  Encryption in investigations

Encryption in Investigations-Discuss in your own words the effects that encryption can have on incident response activities, and explain how the use of encryption technologies could prove to be detrimental to an investigation

  Identify an assessment of risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information.

  Design a network or network component

Students are to design a network or network component using a design tool (example: Visio or CAD). Required is a visual representation of this network along with a document describing all aspect of the network design including product selection.

  Explain simple issue specific security policy in school

Rrules and regulations you have been provided with in your institution.does your school have a similar policy?does it contain all the elements listed in the text?

  What is meant by multi-modal biometrics for access control

What is meant by "Multi-modal Biometrics" for access control. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biometrics

  Basic system administration and security management

Network security training for all staff is required by the center's liability insurance policy. As specified by our insurance carrier, Universal Pro Inc.

  Differences between file viruses and boot viruses

What are the differences between file viruses and boot viruses

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd