CYB 240 Module Two Lab Worksheet
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
240
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by SuperKoala931
1
2-3 Lab Worksheet
Chris Lawton
Southern New Hampshire University
CYB 230: Operating System Security
Dr. Randy Arvay
May 14, 2023
2
CYB 240 Module Two Lab Worksheet
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Attacking Webservers From the WAN
Prompt
Response
In the lab section “Altering the Website,”
Step 25
, when you type “Hacked
Web Server” include your name after the text “Web Server” and provide a
screenshot of Step 24.
In the lab, you covered up the tracking of access to the log files by deleting
lines within the Access.log file. What other types of controls could be put in
place to identify that these changes occurred? What other types of security
measures could be put in place to help secure the web server?
Types of controls:
Audit logging can be used to document all activity within the organization to
record the occurrence of an event, the time at which it occurred, the
responsible user or service and the impacted entity. (Datadog, 2022)
Types of security measures:
Ensuring software is up to date.
Using strong passwords and setting a 90-day minimum on that
password to ensure passwords are constantly changing.
Using proper encryption tools for remote access.
Ensuring that least privilege is always in effect to prevent unnecessary
users from accessing data.
3
Lab: Breaking WEP and WPA and Decrypting the Traffic
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Prompt
Response
In the lab section “Cracking WEP,”
Step 34
, instead of typing WEP, use
WEP-YOURNAME
(for example: WEP-NEOANDERSON) as the name for
the file. Provide a screenshot of Step 37 before clicking “next.”
In the lab section “Cracking WPA,”
Step 20
, instead of typing WPA,
use
WPA-YOURNAME
(for example: WPA-NEOANDERSON) as the
name for the file. Provide a screenshot of Step 24 before clicking
“next.”
5
References
Datadog. (2022, March 9).
Audit Logging: What It Is & How It Works | Datadog
. Audit Logging: What It Is & How It Works.
https://www.datadoghq.com/knowledge-center/audit-logging/#:~:text=to%20learn%20more-,What%20Is%20Audit%20Logging%3F,service
%2C%20and%20the%20impacted%20entity.
Irei, A. (2022). Wireless security: WEP, WPA, WPA2 and WPA3 differences.
Networking
.
https://www.techtarget.com/searchnetworking/feature/Wireless-encryption-basics-Understanding-WEP-WPA-and-WPA2
ServerPronto University. (2018, June 27).
8 Security Measures to Protect Your Web Server | ServerPronto University
.
https://www.serverpronto.com/spu/2016/08/8-security-measures-to-protect-your-web-server/