Please complete attachments
ISSC457
Week 3 Assignment
Name: _________________________
Date: _____________
Fill in your name above, put your full response below each question, save the file using the file naming convention: ISSC457_Week3_Assignment_LastName_FirstName.doc where LastName is your last name and FirstName is your first name, then return this document for grading.
Upon completing lesson 3 reading, you should be able to provide information regarding the below question.
Assignment Rubric ( 100 Points)
Synthesis of Concepts |
60 |
Writing Standards – APA format |
20 |
Timeliness |
20 |
1. List the three components that comprise a routers architecture.
2. What are the basic functions of a router?
3. What is routing table poisoning?
ISSC457
Week 4 Assignment
Name: _________________________
Date: _____________
Fill in your name above, put your full response below each question, save the file using the file naming convention: ISSC457_Week4_Assignment_LastName_FirstName.doc where LastName is your last name and FirstName is your first name, then return this document for grading.
Upon completing lesson 4 reading, you should be able to provide information regarding the below question.
Assignment Rubric ( 100 Points)
Synthesis of Concepts |
60 |
Writing Standards – APA format |
20 |
Timeliness |
20 |
1. What is spam?
2. What is phishing?
ISSC457
Week 4 Lab 3
Name: _________________________
Date: _____________
Fill in your name above, put your full response below the question, save the file using the file naming convention: ISSC457_Lab3_LastName_FirstName.doc where LastName is your last name and FirstName is your first name, then return this document for grading.
If you do not have the Hardware or Software, then review the lab only
Hardware/Software Setup Required
Router or
CISCO Packet Tracer 5.0 (available at http://www.cisco.com/web/learning/netacad/index.html)
Note: The lab requires a CISCO router.
Problem Description
When investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. This is done by port-scanning every routers IP information.
In this lab, you will practice acquiring volatile information from a router using various show commands.
Problem Description
When investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. It can be carried out by port-scanning every router IP.
In this lab, you will practice acquiring volatile information from a router using various show commands.
Estimated completion time: 60 minutes.
Outcome
Report the steps for performing the task above.
Validation/Evaluation
· How to use various show commands to display the following information:
· Clock details
· Routers version
· Running configuration
· Startup configuration
· Routing table
· ARP table
· List of users
· List of interfaces
· Routing protocols
Lab Solution
1. Connect to your router using the console interface. Note: the following commands should work for most of Ciscos router models. If you dont have access to a router, you can use Ciscos Packet Tracer to simulate one.
2. Type show clock and press Enter to display the routers clock.
3. To show the routers version, type show version and press Enter.
4. Type show running-config and press Enter to list the routers running configuration.
5. To recover the routers startup configuration, type show startup-config and press Enter.
6. Type show ip route and press Enter to display the routers routing table.
7. If you want to display the routers ARP table, type show ip arp and press Enter.
8. Type show users and press Enter to list all routers users.
9. The show ip interface command will display the list of routers interfaces.
10. Type show protocols to list the active network routing protocols.
11. Close all windows.
ISSC457
Week 3 Lab 2
Name: _________________________
Date: _____________
Fill in your name above, put your full response below the question, save the file using the file naming convention: ISSC455_Lab2_LastName_FirstName.doc where LastName is your last name and FirstName is your first name, then return this document for grading.
Hardware/Software Setup Required
Paros version 3.2.13 (available at
http://sourceforge.net/projects/paros/
Problem Description
Paros Proxy allows you to scan for Web sites vulnerabilities. An administrator can use it to detect security problems on his or her own Web site and fix them before an attacker exploits them.
In this lab, you will learn how to use Paros Proxy to scan for Web site vulnerabilities.
Estimated completion time: 60 minutes.
Outcome
Report the steps for performing the task above.
Validation/Evaluation
· Add a Web site to Paros
· Scan for vulnerabilities to a cached Web site with Paros
Lab Solution
1. Download Paros Proxy from
http://www.parosproxy.org/index.shtml
and install it on your computer.
2. Run Paros Proxy.
3. Paros can scan for vulnerabilities only for cached Web sites. So, the first thing to do is to cache Web sites with Paros. To cache a Web site, you need to open it with your preferred Web browser. Before that, you need to change the proxy settings for your Web browser.
4. Open your Web browser. Note: For this exercise, we will use Google Chrome as our Web browser.
5. Click on the Customize and control Google Chrome button and select Options to change the proxy setting.
6. Next, select the Under the Hood tab and scroll down to the Network section.
7. Click on the Change proxy settings to open the Internet Properties window. On that window, click on LAN settings.
8. Then, mark the option Use a proxy server for your LAN. Type localhost on the Address field and 8080 on the Port field. Click OK.
9. Click OK again.
10. Click Close to return to the Web browser.
11. Now, visit the Web site you want to scan as you would normally do it with your browser. For example, if you want to scan your companys Web site, type its corresponding URL
www.mycompany.com
in your Web browser to open it. Paros will automatically cache it. Note: Scanning should be done in safe environment.
12. Now, to start scanning the site for common vulnerabilities, select the site from the Sites list on the left panel. Then, go to Analyse -> Scan. Paros will automatically start scanning your Web site.
13. Wait until Paros finishes scanning your site. Click OK to close the following dialog window.
14. Go to the Alerts tab on the bottom panel to view all the security problems Paros found for
www.mycompany.com
.
15. At this point, you should try to fix all the issues listed and make your Web site stronger.
16. Change back the proxy configuration on your Web browser.
17. Close all windows.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more