Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

INTRODUCTION ________________________________________ In the changing field of cybersecurity, you will need to continually identify new threats to your network as evidenced in the network itself and the traffic on that network

Management Jul 06, 2022

INTRODUCTION
________________________________________
In the changing field of cybersecurity, you will need to continually identify new threats to your network as evidenced in the network itself and the traffic on that network. You will need to know how to run network mapping and monitoring software to find vulnerabilities and anomalies that could impact the security of your network in order to recommend sound solutions.

For this task, you will use the virtual world at the “Performance Assessment Lab” web link and access the files and lab environment necessary to run both Nmap and Wireshark on the network associated with this task. You will need to save the output of both Nmap and Wireshark to include in your submission. You will then recommend solutions to address any issues you find.

A. Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.

B. Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.

C. Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with each anomaly.

D. Summarize the potential implications of not addressing each of the anomalies found when running Wireshark.

E. Recommend solutions for eliminating or minimizing all identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations for each vulnerability or anomaly.

F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

G. Demonstrate professional communication in the content and presentation of your submission.

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment