Free Samples
CI6240 Internet Security
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
CI6240 Internet Security
0 Download5 Pages / 1,010 Words
Course Code: CI6240
University: Kingston University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Questions:
1. Demonstrate an understanding of security problems by identifying common types of threats and vulnerabilities of computer, network and information security systems, as well as available security-related algorithms and protocols.
2. Analyse and implement a range of controls to minimise risks of security breaches.
3. Apply the basic methodology of computer security in order to assess and improve the security in a range of scenarios.
Answer:
Applying IP Addresses
Introduction
This task aims to apply the IP addresses for a 5 node mini-network topology. To apply a IP address for a network topology by follows the below steps. First, user needs to login on deter lab.
Experimental Method
This task was carried out in a controlled environment provided by Deter Lab, with a Linux OS and virtual workstations & routers set up in place. An experiment Called “internetworking-FR” was created in Deter Lab, after which a SSH login was made using by command.
Results
Applying IP Addresses to the Devices was successfully carried out and the result of doing so resulted in adjacent devices being able to ping each other. However trying to ping end to end workstations did not yield positive results as the workstations could not send packets to each other. Then, user needs to examine the node interfaces by enter the following the command on the command line.
After, user needs to put the address on the cabled interfaces to identify which the cabled ones are by enter the below command on terminal.
Discussion
This task is effective as it depicts a real time situation on how to configure the IP address for a network topology that is network devices like workstations and routers so as for them to communicate with each other. Here, we will apply the IP address and enabled the adjacent devices to communicate with each other network devices. Through, this is not sufficient in a real time network as a client on one network segment may needs to communicate with another clients on a various network segment (Netbsd.org, 2018). Here, we will demonstrate the sample allocations
Questions
What is “special” about the network and host addresses used at the two “ends” of the network, and why are they different from the ones in the middle?
The first number is called as Network address so, 192.168.253.1/24 is the number that is utilized and it is refer to subnet number or network address. Obviously, the last address is the broadcast address where communicates are sent to and later pushed down to all customers on that subnet. In IP networking, you generally remove 2 from the broadcast address to locate the aggregate sum of addressable IP addresses. 192.168.0.0/24 has a broadcast of 192.168.0.255 and in this way 253 addressable locations. 192.168.0.0/26 has a broadcast of 192.168.0.64 and in this manner 62 addressable locations.
Conclusion
This task is used to provide the understanding of how to setup and configure IP addresses for devices in a network. Applying IP Addresses to the Devices was successfully carried out and the result of doing so resulted in adjacent devices being able to ping each other.
Establishing Routing Tables
Introduction
In Experiment 1, IP Addresses were allocated to devices on the network. The result was the devices where able to ping adjacent devices but not those beyond the gateway/router. Here, the problem is solved so that end-to-end ping of workstations is made possible by adding routes to the IP Table of those devices. Also, establishing the routing tables for a router.
Results
Upon adding routes to the devices, the devices were able to ping other devices which are not adjucent. In other words, End-to-end Communication of workstations was made posible.
Conclusion
This task was successfully prohibited the private address on the network. It also configured the IS router to drop the packets using the IP tables. After IS router setu, it is used to drop private addresses and able to ping SW networks from NW networks. Tcpdump monitors and outputs content of the packets being trasmitted on the network. However when I run the tcpdump, no packets were captured.
Can you explain the differences between the two tcpdump outputs?
When it comes to tcpdump most administrators fall into two classes; they either know tcpdump and the greater part of its banners like the back of their hand, or they sort of know it yet need to utilize a reference for anything outside of the essential use. The explanation behind this is on the grounds that tcpdump is a really propelled charge and it is truly simple to get into the profundities of how organizing functions when utilizing it. You can determine the interface by utilizing the – I flag taken after by the interface name. On most linux frameworks a unique interface name of any can be utilized to advise tcpdump to tune in on all interfaces, I discover this to a great degree helpful while investigating servers with different interfaces. This is particularly obvious when there are directing issues included. The yield of tcpdump is convention subordinate (Tcpdump.org, 2018).
Introduction
This experiment aims to set up a SSL certificate on apache on a web server installed in deter lab testbed environment. Here, we will be demonstrate the following aspects such as experiment in deter lab, starting an experiment , accessing deter lab virtual node, installing apache, and setting SSL certificate on Apache installed. Also, Cross-Site Scripting (XSS) vulnerability exploitation will be demonstrated. These are will be analyzed and discussed in detail.
Experimental Setup
First, we will log on deter lab.
Then, open the experiment.
Conclusion
This experiment was successfully set up the SSL certificate on apache on a web server installed in deter lab testbed environment. Here, we successfully demonstrated the following aspects such as experiment in deter lab, starting an experiment , accessing deter lab virtual node, installing apache, and setting SSL certificate on Apache installed. Also, Cross-Site Scripting (XSS) vulnerability exploitation was demonstrated. These are analyzed and discussed in detail.
References
Cane, B. (2018). A Quick and Practical Reference for tcpdump | Benjamin Cane. [online] Benjamin Cane. Available at: https://bencane.com/2014/10/13/quick-and-practical-reference-for-tcpdump/ [Accessed 10 Aug. 2018].
Netbsd.org. (2018). Chapter 23.Introduction to TCP/IP Networking. [online] Available at: https://www.netbsd.org/docs/guide/en/chap-net-intro.html [Accessed 10 Aug. 2018].
Tcpdump.org. (2018). Manpage of TCPDUMP. [online] Available at: https://www.tcpdump.org/manpages/tcpdump.1.html [Accessed 10 Aug. 2018].
Tech-faq.com. (2018). IP Address Classes. [online] Available at: https://www.tech-faq.com/ip-address-classes.html [Accessed 10 Aug. 2018].
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 5 pages
PAY 3 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2021). Internet Security. Retrieved from https://myassignmenthelp.com/free-samples/ci6240-internet-security/apache-installed.html.
“Internet Security.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/ci6240-internet-security/apache-installed.html.
My Assignment Help (2021) Internet Security [Online]. Available from: https://myassignmenthelp.com/free-samples/ci6240-internet-security/apache-installed.html[Accessed 18 December 2021].
My Assignment Help. ‘Internet Security’ (My Assignment Help, 2021)
My Assignment Help. Internet Security [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/ci6240-internet-security/apache-installed.html.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
With a team of professional legal experts in hand, we at MyAssignmenthelp.com, aim to provide the best law assignment writing help in Canada. All our writers, researchers, editors, and proofreaders possess rich academic and professional expertise. Their in-depth knowledge in this field and decades of experience enables them to help you with the most legal topics and case study with ease and proficiency.
Latest Management Samples
div#loaddata .card img {max-width: 100%;
}
MPM755 Building Success In Commerce
Download :
0 | Pages :
9
Course Code: MPM755
University: Deakin University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More
SNM660 Evidence Based Practice
Download :
0 | Pages :
8
Course Code: SNM660
University: The University Of Sheffield
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration
BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20
Course Code: BSBHRM513
University: Tafe NSW
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More
MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5
Course Code: MKT2031
University: University Of Northampton
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration
MN506 System Management
Download :
0 | Pages :
7
Course Code: MN506
University: Melbourne Institute Of Technology
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology
Next
Our essay writers will gladly help you with:
Powered by essayworldwide.com