Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Computer security lab manual

17/03/2021 Client: saad24vbs Deadline: 3 days

Lab Manual / Principles of Computer Security Lab Manual, Fourth Edition / Nestler / 655-1 / Blind Folio 1

Networking Basics: How Do Networks Work?

Know thyself.

—Oracle at Delphi

Securing a network can be a tricky business, and there are many issues to consider. We must be aware of the vulnerabilities that exist and their corresponding threats and then estimate the probability of the threat acting upon the vulnerability. Measures are implemented to mitigate, avoid, or transfer risk. However, regardless of the effort to minimize risk, there is always the possibility of harm to our information, so we must develop plans for dealing with a possible compromise of our network. Yet before we can really protect our network from attackers, we must first know our network and, ideally, know it better than they do. Hence, we need to learn about what the network does and how it does it so we can develop an understanding of our network’s abilities and limitations. Only then can we truly see our network’s vulnerabilities and do what is necessary to guard them. We cannot secure our network if we do not know how it works.

Part I will demonstrate how devices communicate on a local area connection and cover IP addressing, routing, the three-way handshake, and some of the basic network applications. It will

PART I

01-ch01.indd 1 24/07/14 5:00 PM

2

Lab Manual / Principles of Computer Security Lab Manual, Fourth Edition / Nestler / 655-1 /

Part I: Networking Basics: How Do Networks Work?

also introduce tools that will be used throughout the remainder of the book, such as ping, arp, nslookup, and Wireshark.

This part is divided into three chapters that will discuss the different aspects of the TCP/IP protocol stack. Chapter 1 will cover exercises relating to the network access and Internet layer, Chapter 2 will deal with the transport layer, and Chapter 3 will discuss the application layer. As you go through the labs in this part, you should be constantly asking yourself one question: How is this network vulnerable to attack, and how can it be exploited? It might seem strange to think about how something can be broken when you are learning about how it works, but this is a good opportunity for you to start thinking the way an attacker thinks.

This part will also prepare you for the labs that are to come in Part II.

01-ch01.indd 2 24/07/14 5:00 PM

Lab Manual / Principles of Computer Security Lab Manual, Fourth Edition / Nestler / 655-1 / Chapter 1 Blind Folio 3

Workstation Network Configuration and Connectivity

Labs

Lab 1.1w Windows Client Configuration

Lab 1.1l Linux Client Configuration

Lab 1.1 Analysis Questions

Lab 1.1 Key Terms Quiz

Lab 1.2w Name Resolution in Windows

Lab 1.2 Analysis Questions

Lab 1.2 Key Terms Quiz

Lab 1.3w Windows IPv6 Basics (netsh/ping6)

Lab 1.3 Analysis Questions

Lab 1.3 Key Terms Quiz

Chapter 1

01-ch01.indd 3 24/07/14 5:00 PM

Chapter 1: Workstation Network Configuration and Connectivity4

Lab Manual / Principles of Computer Security Lab Manual, Fourth Edition / Nestler / 655-1 / Chapter 1

This chapter contains lab exercises designed to illustrate the various commands and methods used to establish workstation connectivity in a network based on Transmission Control Protocol/Internet Protocol (TCP/IP). The chapter covers the basics necessary to achieve and monitor connectivity in a networking environment, using both Windows PCs and Linux-based PCs. In this chapter, you will be introduced to some basic commands and tools that will enable you to manipulate and monitor the network settings on a workstation. This is necessary as a first step toward learning how to secure connections.

The chapter consists of basic lab exercises that are designed to provide a foundation in network connectivity and tools. In later chapters of this book, you will use the skills from these lab exercises to perform functions that are necessary to secure a network from attack and investigate current conditions. Built upon the premise that one learns to crawl before walking and to walk before running, this chapter represents the crawling stage. Although basic in nature, this chapter is important because it provides the skills needed to “walk” and “run” in later stages of development.

Depending on your lab setup and other factors, you won’t necessarily be performing all the lab exercises presented in this book. Therefore, to help you identify which lab exercises are relevant for you, each lab exercise number is appended with a letter: “w” labs are built using the Windows environment; “l” labs are built using the Linux environment; “m” labs are built using a combination of Windows and Linux; and “i” labs require an Internet connection.

Lab 1.1: Network Workstation Client Configuration For two computers to communicate in a TCP/IPv4 network (IPv6 is discussed later, in Lab 1.3), both computers must have a unique Internet Protocol (IP) address. An IP address has four octets. The IP address is divided into a network address and a host address. The subnet mask identifies which

01-ch01.indd 4 24/07/14 5:00 PM

Mohammed Khalid
Lab 1.1: Network Workstation Client Configuration 5

Lab Manual / Principles of Computer Security Lab Manual, Fourth Edition / Nestler / 655-1 / Chapter 1

portion of the IP address is the network address and which portion is the host address. On a local area network (LAN), each computer must have the same network address and a different host address. To communicate outside the LAN, using different network IP addresses, a default gateway is required. To connect to a TCP/IP network, normally four items are configured: the IP address (this is both the network portion and the host portion), the subnet mask, the IP address for a Domain Name System (DNS) server, and the IP address for the gateway machine. To communicate within a LAN only, you need the IP address and subnet mask. To communicate with other networks, you need the default gateway. If you want to be able to connect to different sites and networks using their domain names, then you need to have the address of a DNS server as well.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Buy Coursework Help
University Coursework Help
Math Exam Success
Math Guru
A Grade Exams
WRITING LAND
Writer Writer Name Offer Chat
Buy Coursework Help

ONLINE

Buy Coursework Help

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$100 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$109 Chat With Writer
Math Exam Success

ONLINE

Math Exam Success

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$95 Chat With Writer
Math Guru

ONLINE

Math Guru

I will cover all the points which you have mentioned in your project details.

$70 Chat With Writer
A Grade Exams

ONLINE

A Grade Exams

I have read and understood all your initial requirements, and I am very professional in this task.

$61 Chat With Writer
WRITING LAND

ONLINE

WRITING LAND

Give me a chance, i will do this with my best efforts

$68 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Transpose of matrix maple - Standard estimating practice ninth edition pdf - Math 125 worksheet 10 boolean algebra answers - Ode to a large tuna in the market answers - Festo hydraulics advanced level textbook pdf - Community health nursing case study - Example of an extramural community based service - Deta motion sensor downlight - Second hand student books - Www swingers openmarriagesnatural legalizepolygamy org - Cmgtzus - Cox craft rum runner 2 - Mark 8 manifoil lock - Discussion(200 words) - Laboratory activities for general biology i custom fgcu - Citadel cerberus automated turret schematics - Imi ata online test - Managerial accounting multiple choice questions - 3/2 OC - Joaquin duran in memory of - Expand and simplify x 5 x 5 - Short answer - How to calculate gross potential rent - Marketing as strategy nirmalya kumar pdf - Air permeability test for fabric - Reflection Paper - 16.2 kg to lbs - Mackay fuel filler hose - Lab - Coconut water marketing plan - Anyway poem kent keith - Book value per ordinary share - Homework 4 2 mystatlab module four problem set - Discussion post - Capricorn credit union bsb - Compound and mixture quiz - Scf shatterproof screen guard review - Victorian business name registration - Character description year 1 - Risk Management Plan - Mbo blood pressure monitor instructions - BI: Week 5 Assignment - WEEK8-DISCUSSION-Data Science & Big Data Analy - Electroslag welding vs submerged arc welding - Discussion 2 - Talent Management System Outcomes - Entropy change in isobaric process - R v katarzynski [2002] nswsc 613 - Jones v bartlett 2000 hca 56 - ASS 2 - How can i model for ivivva - Don't throw stones at blackbirds meaning - Wembley lumberjack stress relief ball - Is mass marketing dead - Lorma colleges nursing uniform - Give me liberty seagull ed v2 edition 4th pdf - Find the square root of 324 by prime factorization method - Which statement best captures the importance of good personal hygiene - Wk 4, IOP/470: DR 1 - Case Study 5 The Crash of Asiana Flight 214 - Propylene is hydrogenated in a batch reactor - Determining water hardness by edta titration calculations - How to do a mock trial in the classroom - Managerial Economics - What is a professional learning community by richard dufour - Bmw marketing strategy case study - Lasalle claimed oklahoma for france - Aberdeen university pgde timetable - Christmas tree replacement hinge pins - Samsung robot vacuum error code c05 - Sociology - Acu occupational therapy course map - LEG 100 Week 4 Assignment Paula Plaintiff's Really Bad Week, Part 1 - The Role of the SWOT Analysis - Ftk imager lite mac - Design of nanomaterials for nasal and pulmonary drug delivery system - Define object intention and circumstances in relation to human acts - Dulwich college singapore fees - Information - Load rite 5 starr trailer - Nursing head to-toe assessment script - Seven r's of supply chain management - Concepts in the mayflower compact that influenced the founding fathers - Forklift license test answers - Guelph general hospital case study solution - 10 questions on trigonometry. - Saica handbook volume 2 - Target Audience Matrix - Strtergy planning - Harmful - Re moore & co and landauer - Discussion2: Trends in Management Accounting - I ll rise ben harper maya angelou - Field installation work package - Case study , strategic management - Ethics in accounting ppt - Building measuring and profiting from customer loyalty - Dd form 2501 courier card example - Components of emergency management multi agency interoperability - Delta airlines swot analysis presentation - Where did the tallit originate