CYB_240_2-3

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by JusticeJellyfishPerson10226

Report
CYB 240 Module Two Lab CYB-240 2023 Novermeber 3 Lab: Attacking Webservers From the WAN Prompt R In the lab section “Altering the Website,” Step 25 , when you type “Hacked Web Server” include your name after the text “Web Server” and provide a screenshot of Step 24. In the lab, you covered up the tracking of access to the log files by deleting lines within the Access.log file. What other types of controls could be put in place to identify that these changes occurred? What other types of security measures could be put in place to help secure the web server? Types of controls: Another type of control that coul activity in the logs is tracked by which changes occurred. Types of security measures: Other types of security measures remote access, Always using app to-date software, secure HTTPS every user’s access as well as adm Lab: Breaking WEP and WPA and Decrypting the Traffic Prompt R In the lab section “Cracking WEP,” Step 34 , instead of typing WEP, use WEP- YOURNAME (for example: WEP-NEOANDERSON) as the name for the file. Provide a screenshot of Step 37 before clicking “next.” In the lab section “Cracking WPA,” Step 20 , instead of typing WPA, use WPA- YOURNAME (for example: WPA-NEOANDERSON) as the name for the file. Provide a screenshot of Step 24 before clicking “next.” WEP and WPA are considered weak encryption protocols. What has been done to upgrade and make the protocols more secure? The upgrades that have been don protocols are Enhanced encryptio and WPA3 which has stronger en Authentication of Equals (SAE) offline dictionary and brute force
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help