CYB 240 Module Two Lab Worksheet

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by SuperKoala931

Report
1 2-3 Lab Worksheet Chris Lawton Southern New Hampshire University CYB 230: Operating System Security Dr. Randy Arvay May 14, 2023
2 CYB 240 Module Two Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Attacking Webservers From the WAN Prompt Response In the lab section “Altering the Website,” Step 25 , when you type “Hacked Web Server” include your name after the text “Web Server” and provide a screenshot of Step 24. In the lab, you covered up the tracking of access to the log files by deleting lines within the Access.log file. What other types of controls could be put in place to identify that these changes occurred? What other types of security measures could be put in place to help secure the web server? Types of controls: Audit logging can be used to document all activity within the organization to record the occurrence of an event, the time at which it occurred, the responsible user or service and the impacted entity. (Datadog, 2022) Types of security measures: Ensuring software is up to date. Using strong passwords and setting a 90-day minimum on that password to ensure passwords are constantly changing. Using proper encryption tools for remote access. Ensuring that least privilege is always in effect to prevent unnecessary users from accessing data.
3 Lab: Breaking WEP and WPA and Decrypting the Traffic
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Prompt Response In the lab section “Cracking WEP,” Step 34 , instead of typing WEP, use WEP-YOURNAME (for example: WEP-NEOANDERSON) as the name for the file. Provide a screenshot of Step 37 before clicking “next.” In the lab section “Cracking WPA,” Step 20 , instead of typing WPA, use WPA-YOURNAME (for example: WPA-NEOANDERSON) as the name for the file. Provide a screenshot of Step 24 before clicking “next.”
5 References Datadog. (2022, March 9). Audit Logging: What It Is & How It Works | Datadog . Audit Logging: What It Is & How It Works. https://www.datadoghq.com/knowledge-center/audit-logging/#:~:text=to%20learn%20more-,What%20Is%20Audit%20Logging%3F,service %2C%20and%20the%20impacted%20entity. Irei, A. (2022). Wireless security: WEP, WPA, WPA2 and WPA3 differences. Networking . https://www.techtarget.com/searchnetworking/feature/Wireless-encryption-basics-Understanding-WEP-WPA-and-WPA2 ServerPronto University. (2018, June 27). 8 Security Measures to Protect Your Web Server | ServerPronto University . https://www.serverpronto.com/spu/2016/08/8-security-measures-to-protect-your-web-server/