CIS502_Performance_Lab_Report_2_Week 6

docx

School

Strayer University *

*We aren’t endorsed by this school

Course

502

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

8

Uploaded by stephculbreth

Report
Performance Lab Report 2 Template Due in Week 6 Strayer University CIS502 Theories of Security Management Performance Lab Report Week 6 Submitted by: Stephanie Culbreth 5/14/2023 1
Performance Lab Report 2 Template Due in Week 6 Instructions: Column 1 provides the lab number, title, and a brief description of the lab. In Column 2 you will summarize in three to five sentences the key lessons you learned from completing the lab. Lab Key Lessons Learned (No more than 3 to 5 sentences) Chapter 5 5.2.1 Using Ettercap for ARP Spoofing In this lab, you will use Ettercap for address resolution protocol (ARP) spoofing. Ettercap is an open source network security tool. It can be used for security audit and ARP spoofing. Completing the Lab 5.2.1 Performing ARP Spoofing, outlined the importance of having a protocol in place to resolve IP addresses to machine MAC addresses. ARP allows the user to download package information from all configured sources. The user can then execute commands in a third terminal window logged in as a root user to allow packets to pass through the attacker’s system. Typically, the hacker places themselves between the client and the server attempted to be access and they have access to all traffic between the two points. 5.3.1 Obtaining Hardware Information of a Network Adapter In this lab, you will obtain hardware information of a network adapter. A network adapter is the component of a computer's internal hardware that is used for communicating over a network with another computer. Completing the Lab 5.3.1, Obtaining Hardware Information of a Network Adapter, educated me on the steps required to obtain the hardware information of a network adapter. A network adapter is the component of a computer’s internal hardware that is used for communicating over the internet with another computer. The command “get- netadapterhardwareinfo” command yields information about the computer’s PCI capabilities, MSI capabilities, and PCI device customer properties in a read-only format. 2
Performance Lab Report 2 Template Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) 5.3.5 Getting the TCP Settings In this lab, you will get the transmission control protocol (TCP) settings. TCP settings are optimized for different network conditions, including latency and congestion. Lab 5.3.5, Getting the TCP Settings, provided me with a better understanding of the steps required to obtain the TCP Settings of a computer using command prompt. TCP settings are optimized for different network conditions, including latency and congestion. Once cdmlet gets the TCP settings, it can be applied to a port number or destination IP address range. 5.3 . 7 Getting the UDP Settings In this lab, you will get the user datagram protocol (UDP) settings. UDP communicates with the user by sending data over an IP network. Completing Lab 5.3.7, Getting the UDP Settings, educated me on the steps needed to get the User Datagram Protocol settings using Windows PowerShell. UDP communicates with the user by sending data over an IP network. After running the “get-netudpsetting” command in PowerShell, the dynamic port range start port and dynamic port range number of ports on the computer. 5.3.8 Getting Information about the Current Connection Statistics of UDP In this lab, you will get information about the current connection statistics of TCP. TCP enables two hosts to establish a connection and exchange streams of data. After completing Lab 5.3.8, Getting Information about the Current Connection Statistics of UDP, I have a better understanding of the steps required to obtain the statistics of UDP from a computer. UDP is used as Transport Layer communication protocol which is a type of TCP/IP protocol. The “get-netudpendpoint” command returns UDP end point properties, such as local and remote UDP ports. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Performance Lab Report 2 Template Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) 5.3.10 Finding the Host Name of a Machine In this lab, you will find the host name of a machine. A host name is a label assigned to a device connected to a computer network. The hose name is also used to identify the device. Completing Lab 5.3.10, Finding the Host Name of a Machine, afforded me with the knowledge of the steps taken to find the host name of machine. This information is useful because it is assigned to a device connected to a computer network and is used to identify the devices. Using PowerShell, the client would execute command “$env:COMPUTERNAME” to obtain the information. This lab pointed out that environmental variables contain important pieces of information about the system. PowerShell also provides access to environment variables through the Env:drive. 5.3.11 Finding the Physical Address of a LAN Adapter In this lab, you will find the physical address of a local area network (LAN) adapter. A LAN adapter connects a computer or computing device to a network. Completing Lab 5.3.11, Finding the Physical Address of a LAN Adapter, gave me a better understanding of how to find the physical address of a LAN adapter. A LAN adapter is used to connect a computer or device to a local network. The adapter allows the device to communicate over the LAN with other computers or devices. The “getmac” command is used in PowerShell to display the Media Access Control (MAC) addresses for each network adapter in the computer. 5.3.12 Finding the Logical Address of a LAN Adapter In this lab, you will find the logical address of a LAN adapter. A LAN adapter connects a computer or computing device to a network. Lab 5.3.12, Finding the Logical Address of a LAN Adapter, educated me on how to locate the logical address of a LAN adapter connected to a computer. The logical address is also known as the IP address. It is assigned by a software protocol to uniquely identify the device. The “ipconfig” command in PowerShell displays the configured network adapter’s information, such as the IP address, subnet mask, and gateway of the computer. 4
Performance Lab Report 2 Template Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) 5.6.7 Performing a DoS Attack with the SYN Flood In this lab, you will perform a denial of service (DoS) attack with the SYN flood. A DoS attack is an attack meant for shutting down the network or a machine and making it inaccessible to its users. A SYN flood is an attack in which the attacker sends a succession of SYN requests to the target's system. Completing Lab 5.6.7, Performing a DoS Attack with the SYN Flood, gave me a better understanding of the importance of protecting your machine from DoS attacks. These attacks will drastically slow down the network for the machine being attacked. Countermeasure options for such an attack include TCP intercept and filtering, DoS prevention services, Blacklisting of attackers’ IP addresses, Whitelisting of known and trust IP addresses, Better use of SSL/TLS and SSH, and Fingerprint scrubbing techniques (uCertify, Lesson 5) . Chapter 6 6.4.1 Creating ACL in Router In this lab, you will create access control lists (ACL) in router. Access control lists are ordered sets of rules that control the traffic that is permitted or denied the use of a path through the router. These rules can operate at Layer 3, making these decisions on the basis of IP addresses. They can also operate at Layer 4, when only certain types of traffic are allowed based on a TCP or UDP port number. When this is done, the ACL will typically reference a port number of the service or application that is allowed or denied. Completing Lab 6.4.1, Creating ACL in Router, gave me insights on the importance of having an ACL to protect the command and control of network access control system. “An access control list (ACL) is the central repository of all the identities of subjects and objects, as well as the verification and validation information necessary to authenticate an identity and to authorize the access it has requested” (uCertify, Lesson 6). One set of unified policies should lead the creation and management of the ACL, even if it is physically or logically segmented into a root ACL and many subtree ACLs. 5
Performance Lab Report 2 Template Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) Chapter 7 7.2.1 Observing an MD5-Generated Hash Value In this lab, you will observe an MD5-generated hash value. An MD5 hashing algorithm produces a 128-bit hash value or digest value of an entire file. These hash values can be used to check the file’s data integrity. When a user downloads any file, an attacker can manipulate the file data during the process of sending the file between sites. MD5 gives authentication as to whether or not the file has been manipulated. Lab 7.2.1, Observing an MD5-Generated Hash Value, educated me on the importance of using the MD5 algorithm to identify if a file has been manipulated or not. Since messages are typically of variable length, the message digest is fixed length, which makes them easy to use in file systems, communications systems, and security systems (uCertify, Lesson 7). The MD5 algorithm is a quick process that can be beneficial to identifying any corrupted files. 7.2.2 Observe an SHA-Generated Hash Value In this lab, you will observe a SHA-generated hash value. The SHA-256 hashing algorithm produces 1-bit to 256-bit hash values of the entire file. These hash values can be used to check the file’s data integrity. When a user downloads any file, an attacker can manipulate the file data during the processing of sending the file between sites. SHA-256 generates an almost-unique 256-bit (32- byte) signature for a text. Completing Lab, 7.2.2 Observe an SHA-Generated Hash Value, provided me with a better understanding of the steps required to run a SHA-256 hashing algorithm on a file. The SHA series of Secure Hash Algorithms, published by the NSA; is among several published standards that define secure hash functions for use in various kinds of information security systems. The original SHA-0 and SHA-1 standards have been shown to be vulnerable to collision attacks and are being disbanded for use with SSL (uCertify, Lesson 7). 7.4.1 Applying Symmetric Key Encryption In this lab, you will apply symmetric key encryption. This process encrypts and decrypts the information using the same secret key. You will encrypt a file using the AxCrypt open-source encryption algorithm, which uses the AES algorithm with 128-bit keys. Lab 7.4.1, Applying Symmetric Key Encryption, gave insights on the steps to complete a symmetric key encryption to data being exchanged. The algorithms and processes can be complex and can included variations in which the sender’s and recipient’s keys are different; one is easy to calculate from the other. Symmetric refers to the use of the same key, or a simple form of the key, for encryption and decryption (uCertify, Lesson 7). 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Performance Lab Report 2 Template Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) 7.4.2 Using OpenSSL to Create a Public/Private Key Pair In this lab, you will use OpenSSL to create a public/private key pair. OpenSSL is used for secure communication over the network. It works on the exchange of public keys and authentication by a private key. In completing Lab 7.4.2, Using OpenSSL to Create a Public/Private Key Pair, I learned how to use OpenSSL to create a public/private key pair for secure communication over the network. After running the command in the terminal window, a public key or private key randomly generates a serial of numbers which is used as the asymmetric key. This key will encrypt the plain text and generate ciphertext. The user can then enter a command to specify RSA processing which gives unencrypted form of the private PEM file. 7
Performance Lab Report 2 Template Due in Week 6 References uCertify. “Lesson 5 : Communications and Network Security -UCertify.” UCertify , 2016, strayer.ucertify.com/app/? func=ebook&chapter_no=6#top. Accessed 14 May 2023. uCertify. “Lesson 6 : Identity and Access Control -UCertify.” UCertify , 2019, strayer.ucertify.com/app/? func=ebook&chapter_no=7#05WBB. Accessed 15 May 2023. uCertify. “Lesson 7 : Cryptography -UCertify.” UCertify , 2019, strayer.ucertify.com/app/? func=ebook&chapter_no=8#05WCb. Accessed 18 May 2023. 8