Task : Analyze the incident response process. Requirements: An “event” is any observable occurrence in a computer, device, or network. Think of an event as being […]
Task : Analyze the ethics of network sniffing and the practicality of encrypting all network traffic. Assignment Requirements: Network sniffing is the act of observing communications […]
Task : Analyze secure web application design principles against specific attacks. You are attempting to strengthen the security of your company’s e-commerce web application. You send […]
Task : Identify security features of current wireless technologies. You are researching the following wireless security features for your company network: WEP and WPA2 MAC address […]
A PowerPoint presentation with a minimum of 10 slides outlining the following: At a minimum include the following: Detailed description of the area researched Technology involved […]
During this week’s LabSim modules you learned how to apply scanning techniques to perform an internal scan, external scan using Zenmap and scan with Nmap […]