Categories
Cyber Security

Please check this line for me:1. /var/www *(rw, root_squash, sync, no_subtree_c

Please check this line for me:1.
/var/www *(rw, root_squash, sync, no_subtree_check, crossmnt)
2. storage.secureelabsondemand.com:/var/www /var/www nfs resize=8192, wsize=8192, timeo=14, intr
Please they are not working for me. kindly check if the lines are correct. Thanks. (vi command line)

Categories
Cyber Security

Download and install Wireshark from the Wireshark web page on your own PC 2) Sta

Download and install Wireshark from the Wireshark web page on your own PC 2) Start Wireshark and put it into capture mode on your Ethernet connection. 3) Access a single web site. 4) Stop the capture mode and analyze the captured data. What do you see? 5) Clear the capture and restart the capture process. 6) Logon onto a remote service or application via your network ISP or another Internet connection that requires authentication. What does that captured traffic show? 7) Repeat steps 5 & 6 until you have captured packets indicated below. You may have to access different sites or network devices, or generate unique connections to capture all the protocol types. [Hint: have you ever put your network connection in loopback mode?] If you cannot capture a protocol, explain why you cannot. a. ARP b. TCP c. UDP d. HTTP e. HTTPS (TLS) f. FTP g. ICMP h. DNS 8) Restart your network connection and the capture process and allow it to run for 1 hour. At the end of the hour display the network connection statistics and the network packet summary. Compare the collected data with what your firewall displays and the packet count shown under the network connections status found in your operating system. Then start a new capture overnight (at least 4 hours) on your home computer connection. What activity do you see overnight? Provide proof of your one-hour and four-hour Wireshark runs.
2 pages lab experiences and 2 pages researching about the Wireshark application and an analysis of how it can be used to support Information Assurance and Security professionals.

Categories
Cyber Security

Hello, I hope all is well, I need assistance with this assignment, I have the dr

Hello, I hope all is well, I need assistance with this assignment, I have the publish completed, I need the final publish completed. I have attached the publish as well as the attachments for the assignment it self. if you can assist me I would greatly appreciate it!

Categories
Cyber Security

Policy development is a core competency required of Chief Information Security O

Policy development is a core competency required of Chief Information Security Officers. In order to develop policy, however, it is necessary that the CISO and other business leaders understand the underlying issues and, where technology is involved, they must also understand those issues as well.
Read this article: https://www.bigcommerce.com/blog/social-media-advertising/#the-6-best-social-networks-for-ecommerce-advertising
Choose one of the social media platforms listed in the article above and research its privacy policy. Then prepare an “expert opinion” paper for the senior leaders in your organization. (If you cannot find the privacy policy for a given social media platform, choose a different platform.)
For your opinion paper, you must
perform additional research and then write your informed opinion as to the privacy issues that exist or may exist for that platform
identify specific privacy issues which could adversely affect Padgett-Beale
identify any additional issues with that platform which could adversely affect Padgett-Beale’s cybersecurity posture
answer the following questions in your paperWhat do you think about your selected platform’s approach to privacy?
How would the platform’s privacy policy impact an organization that is contemplating using the platform for advertising and marketing?
Which of the social media services provided by the platform would you allow Padgett-Beale’s marketing department to use?
Should Padgett-Beale’s employees in general be permitted to use the platform during the work day (using company networks and/or IT resources). What risks are involved with permitting such usage?
what type of policy would you recommend that Padgett-Beale adopt to govern the organization’s use of social media platforms for marketing and other forms of internal and external communications?
Post your 5 to 7 paragraph “expert opinion” as a reply to this topic. Remember to cite your sources and include your reference list at the end of your posting.

Categories
Cyber Security

Download and install Wireshark from the Wireshark web page on your own PC 2) Sta

Download and install Wireshark from the Wireshark web page on your own PC 2) Start Wireshark and put it into capture mode on your Ethernet connection. 3) Access a single web site. 4) Stop the capture mode and analyze the captured data. What do you see? 5) Clear the capture and restart the capture process. 6) Logon onto a remote service or application via your network ISP or another Internet connection that requires authentication. What does that captured traffic show? 7) Repeat steps 5 & 6 until you have captured packets indicated below. You may have to access different sites or network devices, or generate unique connections to capture all the protocol types. [Hint: have you ever put your network connection in loopback mode?] If you cannot capture a protocol, explain why you cannot. a. ARP b. TCP c. UDP d. HTTP e. HTTPS (TLS) f. FTP g. ICMP h. DNS 8) Restart your network connection and the capture process and allow it to run for 1 hour. At the end of the hour display the network connection statistics and the network packet summary. Compare the collected data with what your firewall displays and the packet count shown under the network connections status found in your operating system. Then start a new capture overnight (at least 4 hours) on your home computer connection. What activity do you see overnight? Provide proof of your one-hour and four-hour Wireshark runs.
2 pages lab experiences and 2 pages researching about the Wireshark application and an analysis of how it can be used to support Information Assurance and Security professionals.

Categories
Cyber Security

Download and install Wireshark from the Wireshark web page on your own PC 2) Sta

Download and install Wireshark from the Wireshark web page on your own PC 2) Start Wireshark and put it into capture mode on your Ethernet connection. 3) Access a single web site. 4) Stop the capture mode and analyze the captured data. What do you see? 5) Clear the capture and restart the capture process. 6) Logon onto a remote service or application via your network ISP or another Internet connection that requires authentication. What does that captured traffic show? 7) Repeat steps 5 & 6 until you have captured packets indicated below. You may have to access different sites or network devices, or generate unique connections to capture all the protocol types. [Hint: have you ever put your network connection in loopback mode?] If you cannot capture a protocol, explain why you cannot. a. ARP b. TCP c. UDP d. HTTP e. HTTPS (TLS) f. FTP g. ICMP h. DNS 8) Restart your network connection and the capture process and allow it to run for 1 hour. At the end of the hour display the network connection statistics and the network packet summary. Compare the collected data with what your firewall displays and the packet count shown under the network connections status found in your operating system. Then start a new capture overnight (at least 4 hours) on your home computer connection. What activity do you see overnight? Provide proof of your one-hour and four-hour Wireshark runs.
2 pages lab experiences and 2 pages researching about the Wireshark application and an analysis of how it can be used to support Information Assurance and Security professionals.

Categories
Cyber Security

I need assistance with this assignment, I have the publish completed, I need the f

I need assistance with this assignment, I have the publish completed, I
need the final publish completed. I have attached the publish as well as the
attachments for the assignment it self. I need to complete this within 1 day, deadline is on tomorrow.

Categories
Cyber Security

I need assistance with this assignment, I have the publish completed, I need the f

I need assistance with this assignment, I have the publish completed, I
need the final publish completed. I have attached the publish as well as the
attachments for the assignment it self. I need to complete this within 1 day, deadline is on tomorrow.

Categories
Cyber Security

Download and install Wireshark from the Wireshark web page on your own PC 2) Sta

Download and install Wireshark from the Wireshark web page on your own PC 2) Start Wireshark and put it into capture mode on your Ethernet connection. 3) Access a single web site. 4) Stop the capture mode and analyze the captured data. What do you see? 5) Clear the capture and restart the capture process. 6) Logon onto a remote service or application via your network ISP or another Internet connection that requires authentication. What does that captured traffic show? 7) Repeat steps 5 & 6 until you have captured packets indicated below. You may have to access different sites or network devices, or generate unique connections to capture all the protocol types. [Hint: have you ever put your network connection in loopback mode?] If you cannot capture a protocol, explain why you cannot. a. ARP b. TCP c. UDP d. HTTP e. HTTPS (TLS) f. FTP g. ICMP h. DNS 8) Restart your network connection and the capture process and allow it to run for 1 hour. At the end of the hour display the network connection statistics and the network packet summary. Compare the collected data with what your firewall displays and the packet count shown under the network connections status found in your operating system. Then start a new capture overnight (at least 4 hours) on your home computer connection. What activity do you see overnight? Provide proof of your one-hour and four-hour Wireshark runs.
2 pages lab experiences and 2 pages researching about the Wireshark application and an analysis of how it can be used to support Information Assurance and Security professionals.

Categories
Cyber Security

1) Download and install Wireshark from the Wireshark web page on your own PC (re

1) Download and install Wireshark from the Wireshark web page on your own PC (recommended),
2) Start Wireshark and put it into capture mode on your Ethernet connection.
3) Access a single web site.
4) Stop the capture mode and analyze the captured data. What do you see?
5) Clear the capture and restart the capture process.
6) Logon onto a remote service or application via your network ISP or another Internet connection
that requires authentication. What does that captured traffic show?
7) Repeat steps 5 & 6 until you have captured packets indicated below. You may have to access
different sites or network devices, or generate unique connections to capture all the protocol
types. [Hint: have you ever put your network connection in loopback mode?] If you cannot
capture a protocol, explain why you cannot.
a. ARP
b. TCP
c. UDP
d. HTTP
e. HTTPS (TLS)
f. FTP
g. ICMP
h. DNS
8) Restart your network connection and the capture process and allow it to run for 1 hour. At the
end of the hour display the network connection statistics and the network packet summary.
Compare the collected data with what your firewall displays and the packet count shown under
the network connections status found in your operating system. Then start a new capture
overnight (at least 4 hours) on your home computer connection. What activity do you see
overnight? Provide proof of your one-hour and four-hour Wireshark runs.
9) Provide a lab report that includes:
a. Your observations on the capabilities of the Wireshark program (requires additional
research to meet the 4-6 page requirement)
b. A diagram of your network connection with respect to how you access the Internet
c. The network statistics and protocol summary of your connection after running an hour
d. Your MAC address from the ARP protocol
e. Any MAC addresses you see in the ARP packets
f. The matching IP addresses seen with the MAC addresses
g. Representative proof that you successfully captured packets for the protocols above
h. Observations on system information or personal information transmitted when you
access the various Internet connections you make
i. Do you see any protocols that concern you? Why do they concern you?
j. An analysis of how Wireshark can support security operations.
Also include an analysis of how Wireshark can support Information Assurance and
Security professionals. .:
Lab reports will be 4 to 6 pages in length (single-spaced in font size 12, with page numbers) and contain
a title page. The title page does not count as one of the pages for the report. Figures can be used in the
report but will not count toward the page count and must be properly labeled. Figures are useful in
showing you completed certain tasks or produced the desired output. Ensure you cite two sources
(Author, Year) in the main body of the Lab Report. The bibliography will be in the APA format and will
not count as one of the page requirements. Appendices will not count as pages for the report. All
references and figures should be properly cited throughout