Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment

Introduction

In this assignment you will use several network tools to look at the protocols and data exchanged between network components. We will be only scratching the surface of the usefulness of these tools but the intent is for you to recognize the tools and understand how they can be useful for troubleshooting as well as simply understanding what is going on in your networks. You will consider the inherent danger of having such tools available indiscriminately and analyze how the information they make available could have information security implications in an enterprise or even for you as an individual.

For this assignment you will need to acquire a network sniffer (also called a packet sniffer). We describe the use of Wireshark which is freely available for MS Windows and provides a GUI. You may use another sniffer if you prefer.

Activities and Deliverables

You are required to perform Task A, B, and C. Submit a short paper which describes your experiences with the tasks performed and includes the answers to questions posed for the individual tasks. Each task is described below.

Task A: Using a Sniffer

Obtain a packet sniffer and install it on your home system. The instructions below have been written presuming that Wireshark has been your choice. Wireshark has a Windows-friendly interface and supports immediate translation of a large, but not exhaustive, set of protocols and interfaces. It is available for free download athttp://www.wireshark.org/. Before installing Wireshark, be sure you read and understand the licensing restrictions. Do not install the program on a computer that does not belong to you without express permission. Sniffers are considered "information assurance" vulnerabilities by most organizations. The tasks posed in this assignment are not questionable uses of the product but some security personnel will consider unapproved installation of a sniffer self-evident of improper activities.

Capture packets in your sniffer. If you need to choose an interface, choose the one through which you receive your Internet connection. Stop after a few packets are received (you may not be able to stop before more than 100, depending on how you are connected to the Internet). If using a command-line sniffer such as tcpdump you will need to specify the number of packets to stop after, and five or ten is sufficient. If using Wireshark, you will likely have to start the sniffer ("Capture" + "Interfaces" + start button for your selected interface) and then stop it ("Capture" + "Stop" or control-E) almost immediately if you are on a shared interface; ten packets collected is sufficient. In most cases, you will see a variety of packets including ARP and UDP. You may also see TCP and other types of packets if you are on a shared interface.

Save two or three UDP packets into a file. This can be done using copy-and-paste if necessary. Wireshark provides the ability to do this from its "File" + "SaveAs" drop-down menu options. You may have to filter or otherwise select the packets you save depending on the tool you chose.

Clear the capture buffer ("File" + "Close" + "Continue without saving" in Wireshark) or restart the sniffer and this time capture only TCP packets.

While the capture is running, point your browser to http://www.umuc.edu/and start it. Then, relatively quickly, stop the capture in thesniffer. You should see several TCP packets captured and should now save two or three of the lengthier ones into a file. You now have your real live packet data to analyze.

Include the saved packets in your submission, preferably as a text file embedded in your submission at the end. Alternatively the packets could be attached as a ".TXT" file or a Wireshark/tcpdump capture file (".CAP").

Provide a paragraph or two describing the ethical use of a packet sniffer. What are its legitimate uses? What should it not be used for? Explain your reasoning.

Task B: Address Resolution (ARP and Ping)

Note: You may be unable to do these actions from work but should be able to do them from home and on Polaris or Nova. Some network administrators block ping at the border routers. Others disable commands because of information assurance concerns.

Collect the current contents of the ARP table and save it in a file. The command "arp -a" will accomplish this on both Windows and Unix systems.

Start up your sniffer and engage the capture. You want to capture ARP packets.

Use the "ping" command to resolve a known address that is available on the networks but is not likely to have already been inserted in the ARP table. On your home system this should be easy because the table will be short and you'll know what sites you've visited recently. On Polaris or Nova it may take a little more work and investigation and a Web page like Google probably will already be in the table.

Stop your sniffer.

Capture the current contents of the ARP table again into a different file.

Locate two "ARP" packets in what your sniffer captured. If there are more, try to locate at least one that corresponds to what was "ping"ed. Put these into a separate file or paste them into your paper and include them with your submission.

Include a paragraph or two in your final submission on the advisability of having the ARP tool available without restrictions on all workstations of an enterprise's network. Explain your reasoning.

TASK C - Simple Encryption

The ciphertext below (which is related to this course) is an example of encryption using a monoalphabetic substitution cipher.

W K H F R X U V H W L W O H L V F P L V 7 6 8 F R P S X W H U Q H W Z R U N L Q J

What is the plaintext for this?

What key was used?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92063282
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Question snmp initially appeared in 1988 but it did not

Question : SNMP initially appeared in 1988, but it did not receive widespread adoption. What have been the issues with SNMP, and have they been addressed? How widely used is SNMP now? Find some examples of tools that use ...

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Network project management assignment -purpose of the

Network Project Management Assignment - Purpose of the assessment - The purpose of this assignment is to build a clear understanding of project management fundamentals and their application, specifically: demonstrate pro ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As