5-3-project-one-cyb220
.pdf
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
220
Subject
Computer Science
Date
Jun 11, 2024
Type
Pages
9
Uploaded by JudgeJayPerson671
5-3 Project One CYB220
Network Security (Southern New Hampshire University)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
5-3 Project One CYB220
Network Security (Southern New Hampshire University)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
Downloaded by Luis Estrella (luisdiaz1065@gmail.com)
lOMoARcPSD|16809895
1
Project One: Virtual Systems and Networking Concept Brief
CYB-220-T3389 Network Security
Professor Anthony Candeias Southern New Hampshire University
February 5
th
, 2023
Downloaded by Luis Estrella (luisdiaz1065@gmail.com)
lOMoARcPSD|16809895
2
1.
Group Policy
a.
Change the Windows User Account Control (UAC) prompt.
b.
Change local password policy settings. Downloaded by Luis Estrella (luisdiaz1065@gmail.com)
lOMoARcPSD|16809895
3
c.
Change the desktop background user rights assignment (disable non-admin change capabilities.) d.
Configure local audit policy settings.
e.
Configure default logon banner (warning that requires a direct affirmation to continue.)
Downloaded by Luis Estrella (luisdiaz1065@gmail.com)
lOMoARcPSD|16809895
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Objective
The goal of this project is to enable students to get hands-on experience creating secure networked architectures. Each team will implement an encrypted overlay network, and implement clients that will use this overlay network to discover and communicate with other clients connected to the network. Creating such a network will give students an intuition of how overlay networks work on services such as Kubernetes and Docker Swarm.
Requirements
Design and implement an encrypted overlay network that consists of a single network end-point and multiple clients that can connect to this network. Each client can communicate with other clients as long as these clients are on the same network.
Network Design
A high-level design of the network is shown in the figure below. The traffic flows as follows -
• Flow 1 -> This flow occurs every time a new client is started. Each client has a name (e.g., client1.c6610.uml.edu, client2.c6610.uml.edu) that it registers with the network.
• Flow…
arrow_forward
INSTRUCTIONS: Fill in the nmap SYN Scan Responses for the remainder of this table.
NMAP Port Status
Reported
Response from Target
No response from target or
ICMP destination unreachable.
NMAP Analysis
The service is listening on the port.
The service is not listening on the port.
The port is firewalled.
arrow_forward
Search the web for a tool that fetches DNS record (e.g., who.is, nslookup.io), then use it to fill-in the following:
• Complete the A record for our university web server: (
TTL)
· UJ has 2 authoritative servers. This appeared from DNS record type
The first authoritative
server name is
arrow_forward
Using the photo provided, what are the following answers
MAC Destination Address:MAC Source Address:MAC Type (Length):IP Version #:IP Header Length:IP Type of Service:IP Total Length:IP Identification:IP Fragment Flag|Offset:IP Time-to-live:IP Next Protocol:IP Header Checksum:IP Source address:IP Destination address:TCP source port:TCP destination port:TCP Sequence number:TCP Acknowledgement number:TCP Window size:TCP Checksum:
arrow_forward
How is a Canonical Name (CNAME) record used?
O It is used for reverse DNS lookups
O It identifies the name server that's authoritațive for the domain
It functions as an alias for another record that allows you to refer to the same
resource with different names
It contains the address of an e-mail server responsible for the domain
The 13 DNS servers that keep a database of addresses of other DNS servers
managing top-level domain names are known as:
arrow_forward
DT ATC RS3 (config)# username techadmin password 63t0ut0fh3r3!
DT ATC_RS3 (config) # enable secret 5tayout!!e!
DT ATC_RS3 (config) # service password-encryption
DT ATC_RS3 (config) # login block-for 180 attempts 2 within 60
DT ATC_RS3 (config) # 1ine console 0
DT ATC_RS3 (config-line) # login local
DT_ATC_RS3(config-line) # end
DT ATC RS3# exit
Refer to the exhibit. The exhibited configuration is entered by a network administrator into a new router. Sometime later a network
technician proceeds to log in to the router via a console connection. The technician enters techadmin as the user name and tries a
password of 63t0utOfh3r3!. What will be the result of this action?
O The router will display the DT_ATC_RS3> prompt.
O The router will be locked for 2 minutes and 30 seconds.
O The router will deny access and display a banner message.
O The router will deny access and display an error message.
arrow_forward
Computer Science
Visit http://centralops.net/co/domaindossier.aspx (Links to an external site.) and enter a domain name (e.g., mit.edu) in the “domain or IP address” text box. Check the “domain whois record” check box and click the Go button. What information is displayed? What other footprinting tools are out there?
arrow_forward
a^A stream cipher using XOR based encryption along with a key stream is to be used to secure a communications link. What is the key stream and what property
must it have to ensure the link is secure?
arrow_forward
Question 4
Banner grabbing is the activity of probing services running behind an open port to obtain
information.
O True
O False
Question 5
A company's IT security engineer has noticed several employees periodically checking their social
media accounts. One such platform allows chat, which can include sharing links, photos, and videos.
When the engineer casually observes one user about to click a link to view a video, she stops the
worker. Afterward, she approaches the chief information officer (CIO) and advises that all social
media accounts be blocked, and that only online training videos authorized by the company be
allowed to be viewed. What threat is the IT security engineer concerned about?
O Spam
O Trojan horse
O Denial of service (DoS) attack
O Covert channel
arrow_forward
Distinguish the different types of DNS records. Each one will be briefly talked about, with specific examples and reasons for why they should be used. Web and mail servers in the same company can have the same hostname alias, but this isn't always possible.
arrow_forward
DNS records, authoritative servers, and iterated and non-iterated requests are all covered in this comprehensive guide.
arrow_forward
Learn the distinctions between authoritative DNS requests, root DNS queries, and iterative DNS searches. ?
arrow_forward
How does the process of session management work in web applications, and what are some common session hijacking techniques?
arrow_forward
Jane Smith is responsible for security at the ABC Company. She has a moderate budget with which to purchase security solutions. To date, she has installed a router-based firewall between the network and the outside world. She also has a commercial virus scanner on every machine on the network.
How would you assess Jane’s security requirements? (See Select Systems Controls in Research Materials.)
Describe three security controls Jane might be missing.
https://youtu.be/vKFtEt_i62o
arrow_forward
What are cookies in the context of web applications, and how are they used for session management?
arrow_forward
'There is no idea of client and server sides of a contact session for a P2P file-sharing tool,' the remark goes. Is it true, or is it not?
arrow_forward
What are the most recent techniques for LAN security? Name four categories, and then describe each one.
arrow_forward
The DDOS attack on Dyn was a series of distributed denial-
of-service attacks (DDOS attacks) on October 21, 2016,
targeting systems operated by Domain Name System (DNS)
provider Dyn. The attack caused major Internet platforms
and services to be unavailable to large swathes of users in
Europe and North America by using loT (Interment on
Things).
Required:
In your opinion, how the chances of such attacks can be
reduced?
arrow_forward
Create a list of DNS records organized by the kind of record that each record contains. For each of them, examples and an analysis of why their use is recommended have been supplied. Do you believe it is feasible to use the same name for a web server and a mail server? If so, why?
arrow_forward
Create a list of the various types of DNS records. Each should be elucidated with
concrete examples and an explanation of its use. Is it possible for web and mail servers
to share a hostname alias?
arrow_forward
Everything from iterative to non-iterative DNS searches to authoritative servers, root servers, and DNS entries are covered in depth.
arrow_forward
For the Shalyer malware, please write a short paragraph based on the given background and website info:
Shalyer – Trojan
Shlayer is a downloader and dropper for MacOS malware. It is primarily distributed through malicious websites, hijacked domains, and malvertizing posing as a fake Adobe Flash updater.
https://www.cisecurity.org/insights/blog/top-10-malware-march-2022
The directory with executable files inside the application package contains two Python scripts: gjpWvvuUD847DzQPyBI (main) and goQWAJdbnuv6 (auxiliary). The latter implements data encryption functions by means of a byte shift on the key key:
The encryptText/decryptText pair of functions encrypt and decrypt strings;
encryptList encrypts the contents of the list passed in the arguments; decryptList performs the inverse operation;
The getKey() function generates an encryption key based on the time in the operating system.
Shlayer itself performs only the initial stage of the attack — it penetrates the system, loads…
arrow_forward
There is an extensive discussion on DNS records, authoritative and root servers, iterated and unified queries, and everything in between.
arrow_forward
15) If the form is submitted via GET request using HTTP, can a browser adversary (i.e., one who can locally observe the URLs requested by the user) obtain the password?
True
False
16) If the form is submitted via POST request using HTTP, can a network adversary obtain the password?
True
False
arrow_forward
Please send me answer with in 10 min!! I will rate you good for sure!! Please solve all questions with explaination!!
Question(1) Which statement is the most correct with respect to defense in depth?
Group of answer choices
It is commonly used in network security architecture
It is used in network, data and application security architecture.
It enforces security only at physical, MAC and network layer of the OSI model
It is implemented through multiple, concentric zone boundaries,
Question(2) Which of the following tools are not used to enforce integrity of data in flight?
Group of answer choices
Tunnels
Encryption
Firewalls
VPNs
Question(3) Which security architecture design principle can be applied to a SaaS based application?
Group of answer choices
Compromise Recording
Open Design
Separation of Privilege
Psychological Acceptability
arrow_forward
Learn about iterative, root, and authoritative DNS lookups.
arrow_forward
Your company has made a data-sharing agreement with another company. The administration of both companies has decided to use FTP to exchange data across their networks. On both ends of the network, data will be exchanged between already-established servers. You've been given the duty of coming up with a firewall-specific technique to allow this new connection. What is your plan of action?
Which one would you recommend, and why?
arrow_forward
Your firm has entered into a data-sharing arrangement with another firm.Both firms' administrations have agreed to use FTP to transfer data over their networks.Data will be transmitted between already-established servers on both ends of the network.You've been tasked with devising a firewall-specific method for allowing this new connection.What are your plans for the future? Which one do you think is the best, and why?
arrow_forward
This tutorial is everything you need to learn about DNS records, authoritative servers, and iterated and non-iterated queries.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337097536/9781337097536_smallCoverImage.gif)
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Objective The goal of this project is to enable students to get hands-on experience creating secure networked architectures. Each team will implement an encrypted overlay network, and implement clients that will use this overlay network to discover and communicate with other clients connected to the network. Creating such a network will give students an intuition of how overlay networks work on services such as Kubernetes and Docker Swarm. Requirements Design and implement an encrypted overlay network that consists of a single network end-point and multiple clients that can connect to this network. Each client can communicate with other clients as long as these clients are on the same network. Network Design A high-level design of the network is shown in the figure below. The traffic flows as follows - • Flow 1 -> This flow occurs every time a new client is started. Each client has a name (e.g., client1.c6610.uml.edu, client2.c6610.uml.edu) that it registers with the network. • Flow…arrow_forwardINSTRUCTIONS: Fill in the nmap SYN Scan Responses for the remainder of this table. NMAP Port Status Reported Response from Target No response from target or ICMP destination unreachable. NMAP Analysis The service is listening on the port. The service is not listening on the port. The port is firewalled.arrow_forwardSearch the web for a tool that fetches DNS record (e.g., who.is, nslookup.io), then use it to fill-in the following: • Complete the A record for our university web server: ( TTL) · UJ has 2 authoritative servers. This appeared from DNS record type The first authoritative server name isarrow_forward
- Using the photo provided, what are the following answers MAC Destination Address:MAC Source Address:MAC Type (Length):IP Version #:IP Header Length:IP Type of Service:IP Total Length:IP Identification:IP Fragment Flag|Offset:IP Time-to-live:IP Next Protocol:IP Header Checksum:IP Source address:IP Destination address:TCP source port:TCP destination port:TCP Sequence number:TCP Acknowledgement number:TCP Window size:TCP Checksum:arrow_forwardHow is a Canonical Name (CNAME) record used? O It is used for reverse DNS lookups O It identifies the name server that's authoritațive for the domain It functions as an alias for another record that allows you to refer to the same resource with different names It contains the address of an e-mail server responsible for the domain The 13 DNS servers that keep a database of addresses of other DNS servers managing top-level domain names are known as:arrow_forwardDT ATC RS3 (config)# username techadmin password 63t0ut0fh3r3! DT ATC_RS3 (config) # enable secret 5tayout!!e! DT ATC_RS3 (config) # service password-encryption DT ATC_RS3 (config) # login block-for 180 attempts 2 within 60 DT ATC_RS3 (config) # 1ine console 0 DT ATC_RS3 (config-line) # login local DT_ATC_RS3(config-line) # end DT ATC RS3# exit Refer to the exhibit. The exhibited configuration is entered by a network administrator into a new router. Sometime later a network technician proceeds to log in to the router via a console connection. The technician enters techadmin as the user name and tries a password of 63t0utOfh3r3!. What will be the result of this action? O The router will display the DT_ATC_RS3> prompt. O The router will be locked for 2 minutes and 30 seconds. O The router will deny access and display a banner message. O The router will deny access and display an error message.arrow_forward
- Computer Science Visit http://centralops.net/co/domaindossier.aspx (Links to an external site.) and enter a domain name (e.g., mit.edu) in the “domain or IP address” text box. Check the “domain whois record” check box and click the Go button. What information is displayed? What other footprinting tools are out there?arrow_forwarda^A stream cipher using XOR based encryption along with a key stream is to be used to secure a communications link. What is the key stream and what property must it have to ensure the link is secure?arrow_forwardQuestion 4 Banner grabbing is the activity of probing services running behind an open port to obtain information. O True O False Question 5 A company's IT security engineer has noticed several employees periodically checking their social media accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the engineer casually observes one user about to click a link to view a video, she stops the worker. Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts be blocked, and that only online training videos authorized by the company be allowed to be viewed. What threat is the IT security engineer concerned about? O Spam O Trojan horse O Denial of service (DoS) attack O Covert channelarrow_forward
- Distinguish the different types of DNS records. Each one will be briefly talked about, with specific examples and reasons for why they should be used. Web and mail servers in the same company can have the same hostname alias, but this isn't always possible.arrow_forwardDNS records, authoritative servers, and iterated and non-iterated requests are all covered in this comprehensive guide.arrow_forwardLearn the distinctions between authoritative DNS requests, root DNS queries, and iterative DNS searches. ?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337097536/9781337097536_smallCoverImage.gif)
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning