Preview

Unit 454 Lab 4 Essay

Satisfactory Essays
Open Document
Open Document
457 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 454 Lab 4 Essay
Questions for 454 Lab 4

View the video for Lab 4 - then answer the following questions based on the information presented in the video.

(3 points) 1. List 3 forms evidence is typically discovered in network forensics

The 3 forms of evidences are 1)logs maintained by firewalls, intrusion detections systems, servers, 2)headers of network traffic like e-mail, and 3) active network monitoring – packet sniffers.

(1 point) 2. What are the 3 components of the 3-way handshake? (must get all 3)

The 3 components of the 3-way handshake are SYN-SYN-ACK. There are 3 messages transmitted by TCP to negotiate and start a TCP session between the two computers. This is designed so that two computers attempting to communicate can negotiate the parameters of
…show more content…
It can be originated from one country and it can be controlled by many bots countries.

What method was used to foul network forensics in this example?

The method to foul network is that one country is controlling the rest of the bots computer which looks like the attacks are from all over the countries.

(1 point) 4. What property of a firewall is the primary distinguishing factor between it and an intrusion detection system (IDS)?

Firewall sits at the boundary of a network and deny traffic that breaks its rules. However, intrusion detection system has sensors throughout the network and usually only logs rule violations and traffic inside the network. It gives view of scanning and probing attempts outside of network.

(1 point) 5. What is the purpose of a Honeypot?

Honey pot is a closely monitored decoy system. It traces the network attacks. It can distract from more valuable targets and gather forensic evidence from the attackers and their techniques.

(1 point) 6. The first attack demonstrated on the Nittany Corp. network in the lab video is this kind of attack.

The network in the lab video is a port scan

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    To establish a connection, TCP uses a three-way handshake. Before a client attempts to connect with a server, the server must first bind to and listen at a port to open it up for connections: this is called a passive open. Once the passive open is established, a client may initiate an active open. To establish a connection, the three-way (or 3-step) handshake occurs:…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The firewall process can tightly control what is allowed to traverse from one side to the other. As with most aspects of security, deciding what type of firewall to use will depend upon factors such as traffic levels, services needing protection and the complexity of rules required. The difficulty for firewalls is distinguishing between legitimate and illegitimate traffic. Firewalls, if configured correctly, can be a reasonable form of protection from external threats including some denial of service (DOS) attacks. If not configured correctly they can be major security holes in an organization. The most basic protection a firewall provides is the ability to block network traffic to certain destinations. This includes both IP addresses and particular network service ports.…

    • 1578 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    4. Why is evidence important in forensic science? What evidence was important in the episodes? Why?…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    A 3-way handshake allows a connection to be created between a client and server. The client sends a SYN requesting a connection to the server, then the server sends a SYN-ACK back to acknowledge the request, then the client send an ACK to acknowledge the connection to the server.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The network infrastructure is the first line of defense between the Internet and public facing web servers. Firewalls provide the first line of defense in network security infrastructures. They accomplish this by comparing corporate policies about users' network access rights to the connection information surrounding each access attempt. User policies and connection information must match up, or the firewall does not grant access to network resources; this helps avert break-ins.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    1.07 Lab questions

    • 372 Words
    • 2 Pages

    4. Why is evidence important in forensic science? What evidence was important in the episodes? Why?…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    4. Network Admissions Control - Where a client (supplicant) must pass muster with the networks policy server before being able to connect to resources on the network. Internal firewalls at the host level - These can be software based (personal firewalls) or hardware based such as the 3Com embedded firewalls and policy server that are host-based, hardware-embedded firewalls for desktops, servers and notebooks. These firewalls help to protect individual systems inside or outside the perimeter, wherever an additional layer of security is needed.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    5) Firewall: A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    In this file of SCI 207 Week 4 Laboratory Questions you will find the next information:…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Task 1: Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside to the internal network. Hardware firewalls can protect computers on a local area network and they can be implemented without much configuration difficulty.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Unit 8 eCommerce P1

    • 1328 Words
    • 6 Pages

    Firewall: A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analysing the data packets and determining whether they should be allowed through or not, based on a rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.…

    • 1328 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    5. What is the difference between a traditional IP Stateful Firewall and a Deep Packet Inspection Firewall?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Forensic Science

    • 252 Words
    • 2 Pages

    At this point, you are asked to complete the video journey questions. Each link (the title of the lab) has a set of questions beneath it. Using the link, answer the questions that follow. Note that links open up a new browser window.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays

Related Topics