CYB 240 Module Two Lab Worksheet Brandon Meadows2

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Jun 10, 2024

Type

docx

Pages

5

Uploaded by BrigadierMeerkatMaster1059

Report
CYB 240 Module Two Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Attacking Webservers From the WAN Prompt Response In the lab section “Altering the Website,” Step 25 , when you type “Hacked Web Server” include your name after the text “Web Server” and provide a screenshot of Step 24. In the lab, you covered up the tracking of access to the log files by deleting lines within the Access.log file. What other types of controls could be put in place to identify that these changes occurred? What other types of security measures could be put in place to help secure the web server? Types of controls: Audit logging can be used to document all activity within the organization to record the occurrence of an event, the time at which it occurred, the responsible user or service and the impacted entity. (Datadog, 2022) Types of security measures: Ensuring software is up to date. Using strong passwords and setting a 90-day minimum on that password to ensure passwords are constantly changing. Using proper encryption tools for remote access. Ensuring that least privilege is always in effect to prevent unnecessary users from accessing data.
Lab: Breaking WEP and WPA and Decrypting the Traffic
Prompt Response In the lab section “Cracking WEP,” Step 34 , instead of typing WEP, use WEP- YOURNAME (for example: WEP-NEOANDERSON) as the name for the file. Provide a screenshot of Step 37 before clicking “next.” In the lab section “Cracking WPA,” Step 20 , instead of typing WPA, use WPA- YOURNAME (for example: WPA-NEOANDERSON) as the name for the file. Provide a screenshot of Step 24 before clicking “next.” WEP and WPA are considered weak encryption protocols. What has been done to upgrade and make the protocols more secure? WPA uses a 256-bit key for encryption, which is a major upgrade from the 64-bit and 128-bit keys used by the WEP system. WPA uses the Temporal Key Integrity Protocol (TKIP), which dynamically generates a new key for
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Wi-Fi Security: WEP vs WPA or WPA2 | Avast