solution: Please complete attachments ISSC457 Week 3 Assignment Name: _________________________ Date: ____

Please complete attachments

ISSC457

Week 3 Assignment

Name: _________________________
Date: _____________

Fill in your name above, put your full response below each question, save the file using the file naming convention: “ISSC457_Week3_Assignment_LastName_FirstName.doc” where LastName is your last name and FirstName is your first name, then return this document for grading.

Upon completing lesson 3 reading, you should be able to provide information regarding the below question.

Assignment Rubric ( 100 Points)

Synthesis of Concepts

60

Writing Standards – APA format

20

Timeliness

20

1. List the three components that comprise a router’s architecture.

2. What are the basic functions of a router?

3. What is routing table poisoning?

ISSC457

Week 4 Assignment

Name: _________________________
Date: _____________

Fill in your name above, put your full response below each question, save the file using the file naming convention: “ISSC457_Week4_Assignment_LastName_FirstName.doc” where LastName is your last name and FirstName is your first name, then return this document for grading.

Upon completing lesson 4 reading, you should be able to provide information regarding the below question.

Assignment Rubric ( 100 Points)

Synthesis of Concepts

60

Writing Standards – APA format

20

Timeliness

20

1. What is spam?

2. What is phishing?

ISSC457

Week 4 Lab 3

Name: _________________________
Date: _____________

Fill in your name above, put your full response below the question, save the file using the file naming convention: “ISSC457_Lab3_LastName_FirstName.doc” where LastName is your last name and FirstName is your first name, then return this document for grading.

If you do not have the Hardware or Software, then review the lab only…

Hardware/Software Setup Required

Router or

CISCO Packet Tracer 5.0 (available at http://www.cisco.com/web/learning/netacad/index.html)

Note: The lab requires a CISCO router.

Problem Description

When investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. This is done by port-scanning every router’s IP information.

In this lab, you will practice acquiring volatile information from a router using various show commands.

Problem Description

When investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. It can be carried out by port-scanning every router IP.

In this lab, you will practice acquiring volatile information from a router using various show commands.

Estimated completion time: 60 minutes.

Outcome

Report the steps for performing the task above.

Validation/Evaluation

· How to use various show commands to display the following information:

· Clock details

· Router’s version

· Running configuration

· Startup configuration

· Routing table

· ARP table

· List of users

· List of interfaces

· Routing protocols

Lab Solution

1. Connect to your router using the console interface. Note: the following commands should work for most of Cisco’s router models. If you don’t have access to a router, you can use Cisco’s Packet Tracer to simulate one.

2. Type show clock and press Enter to display the router’s clock.

3. To show the router’s version, type show version and press Enter.

4. Type show running-config and press Enter to list the router’s running configuration.

5. To recover the router’s startup configuration, type show startup-config and press Enter.

6. Type show ip route and press Enter to display the router’s routing table.

7. If you want to display the router’s ARP table, type show ip arp and press Enter.

8. Type show users and press Enter to list all router’s users.

9. The show ip interface command will display the list of router’s interfaces.

10. Type show protocols to list the active network routing protocols.

11. Close all windows.

ISSC457

Week 3 Lab 2

Name: _________________________
Date: _____________

Fill in your name above, put your full response below the question, save the file using the file naming convention: “ISSC455_Lab2_LastName_FirstName.doc” where LastName is your last name and FirstName is your first name, then return this document for grading.

Hardware/Software Setup Required

Paros version 3.2.13 (available at
http://sourceforge.net/projects/paros/

Problem Description

Paros Proxy allows you to scan for Web sites vulnerabilities. An administrator can use it to detect security problems on his or her own Web site and fix them before an attacker exploits them.

In this lab, you will learn how to use Paros Proxy to scan for Web site vulnerabilities.

Estimated completion time: 60 minutes.

Outcome

Report the steps for performing the task above.

Validation/Evaluation

· Add a Web site to Paros

· Scan for vulnerabilities to a cached Web site with Paros

Lab Solution

1. Download Paros Proxy from
http://www.parosproxy.org/index.shtml
and install it on your computer.

2. Run Paros Proxy.

3. Paros can scan for vulnerabilities only for cached Web sites. So, the first thing to do is to cache Web sites with Paros. To cache a Web site, you need to open it with your preferred Web browser. Before that, you need to change the proxy settings for your Web browser.

4. Open your Web browser. Note: For this exercise, we will use Google Chrome as our Web browser.

5. Click on the “Customize and control Google Chrome” button and select Options to change the proxy setting.

6. Next, select the “Under the Hood” tab and scroll down to the Network section.

7. Click on the “Change proxy settings” to open the Internet Properties window. On that window, click on “LAN settings.”

8. Then, mark the option “Use a proxy server for your LAN.” Type localhost on the Address field and 8080 on the Port field. Click OK.

9. Click OK again.

10. Click Close to return to the Web browser.

11. Now, visit the Web site you want to scan as you would normally do it with your browser. For example, if you want to scan your company’s Web site, type its corresponding URL
www.mycompany.com
in your Web browser to open it. Paros will automatically cache it. Note: Scanning should be done in safe environment.

12. Now, to start scanning the site for common vulnerabilities, select the site from the Sites list on the left panel. Then, go to Analyse -> Scan. Paros will automatically start scanning your Web site.

13. Wait until Paros finishes scanning your site. Click OK to close the following dialog window.

14. Go to the Alerts tab on the bottom panel to view all the security problems Paros found for
www.mycompany.com
.

15. At this point, you should try to fix all the issues listed and make your Web site stronger.

16. Change back the proxy configuration on your Web browser.

17. Close all windows.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more