Part 1
Some of the major vulnerability, which are majorly seen within the concept of the network, are stated below:
Missing patches: All it takes for an attacker to indulge into different illegal activity within the concept of the network is a missing patch on the server. This directly allows an unauthenticated command prompt or other backdoor path into the environment of the web. The main aspect, which should be taken into consideration in the aspect, is that the patches should be applied very carefully (Raines, 2017).
Weak or default password: The main vulnerability in the concept of the weak password or a default password. The main aspect, which is taken into consideration in the aspect, is that any type of intruders can directly indulge into different types of activity. The activity can range from accessing of the data of the user or of the system. The password should be always secured and it should be taken care of that, it does not go into the hand of another person exact the authorized user. This would be directly securing the networking channel and helping to build a more secured aspect of the networking.
Misconfigured firewall rule base: It can be stated here that the concept of the misconfigured firewall rule base can be considered as one of the most important vulnerability in the concept of the network. It can be considered as an assumption, which directly states that everything is going fine in the concept of the network and everything is well inside the concept of the firewall. The concept of the digging into the firewall rule base that has been never analyzed can be considered inevitable with serious impact in the sector of the working in different scenario. This directly allows unauthorized user to get into the concept of the network and retrieve the saved data from the concept of the network (Raines, 2017).
Unauthorized access: It can be stated here that the sector of the unauthorized access can be considered very much vital in the aspect as it could harm the overall working of the system. In most of the cases, it can be seen that the path of the network access and the authority to access the network should be restricted to only authorized person who would be directly dealing with the different aspects of the network. The security of the network can be considered as a very important point and it should be always taken care of.
Part 2
Part 3
Part 4
The concept of VLAN is very much beneficial in the network. This is due to the factor that a VLAN allows a network manager to logically segment a LAN into the different broadcast domain. Since the concept of the VLAN is logically segmented and not a physical device it sometimes does not need to be implemented physically. Different network, which are located on the same channel, can directly become one communication channel with the help of the VLAN (Ghali, Frayret & Robert, 2016).
The main advantage, which can be related to the aspect of the VLAN, is that in the concept of high percentage of multicast and broadcast VLAN concept can directly decrease the need of such traffic to unnecessary destination. When comparing a switch with router it can be stated that a router requires more processing of the incoming traffic. As the volume of the traffic passes through the router the aspect of the latency in the router can be decreased which would be directly helping the implementation of the network. The use of VLAN can directly reduce the number of routers which are required in the network channel since the concept of the VLAN’s create a broadcast domain using the switch instead of the concept if the router.
Part 5
Source(Required) |
Description |
Log (optional) |
Logs a match to this rule. This is mainly recommended when a rule directly indicates a security breach such as a data packet on a policy that is meant only for the use in the voice channel. |
Queue (optional) |
Mirrors session of the packet to data path or the remote destination. |
Time range(optimal) |
The queue in which a packet matching the rules would be placed. Select of high for the higher priority and low for low level packets. |
Black list |
Automatically blacklist a client when a traffic is present which may include some sort of intruder activity. |
White list |
A rule, which directly explains the aspect, which is related to the working of the packets and how they would be nearing into the network and what, would be the main function of the packet (Neira, Corey & Barber, 2014). |
TOS |
The TOS must be marked at the end of each of the header which would be directly securing the packets and would be restricting the intruders to be indulged into the different |
Part 6
Part 7
Sys admin: The system admin has the overall power of the network. He has the role of taking care of the overall functionality of the network and intend to work for the network. He should be able to deal with any problem, which is associated with the network. In case of any risk factor, he should be able to deal with the different functionality of the system and take care of the aspect.
Audit: The sector of the audit play a very vital role in the sphere of the networking due to the factor of involving of the different sectors of the functionality, which is archived from the system. The main policy, which can be applicable in the concept, is that most of the devices should be upmost and should be performing according to the requirement of the system. The concept of the audit should be done in some period of time which directly the responsibility of the main in charge of the person (Ghali, Frayret & Robert, 2016). If any type of error are found in the network it should be directly be secured and the system should be maintained properly. Sometimes an initial planning has to be done in the aspect of the audit policy due to the factor that there can be different types of alteration into the system, which would be directly affecting the normal functionality of the system and the network as well.
Network: The main policy, which is related to the aspect, can be in the sector that all the packets, which enter the network, are transferred to the port, which has to be accessed. In most of times it can be stated that overall main motive of the network is to reduce the overall time which is involved in the delivery of the packets from one part to another part. The network should be highly secured due to the aspect of there can be different types of crucial activity, which are done in the form of the network, and it can include different types of packets, which may include different types of vital information.
Security: The aspect of the security can be considered as one of the most important parts in the concept of the networking. This is due to the factor that there can be different types of attack, which can be initiated into the system which would be directly affecting the overall functionality of the system. The main policy, which can be applicable in the concept, is that the security enhancement of the different components of the system should be done properly so that the it would not be effecting the internal as well as external working of the organization. In most of the times, there are different policies, which are included into the concept of the working of the network, which would be maintained in the internal as well as external working of the system (Ghali, Frayret & Robert, 2016).
Part 2
Scanning Server
TCP SYN scan
Sudo nmap –sS scanme.namp.org
Enable OS detection and version detection.
Quick scan
Scan a single port
Scan a range of ports
Scan all ports
4.
Command used to scan server |
Sudo nmap scanme.namp.org |
IP address of the server |
45.32.33.156 |
Ports open in the server |
22 – ssh 25 – smtp 30 – http |
Sunning Web server |
Http Server, port 30 |
web server version in use is patched |
No |
5. HTTP packets
Exclude HTTP packets
Difference Between the capture filter and Display filter
A capture filter is used to select which packets should be saved to disk while capturing. For capture filters Wireshark uses the BPF syntax. BPF is module that runs in the kernel and can therefor maintain high rates of capturing because the packets do not have to move from kernel space to user space when filtering. The things that can be filtered on are predefined and limited (compared to display filters) as full dissection has not been done on the packets.
Display filters are used to change the view of a capture file. They take advantage of the full dissection of all packets. This makes it possible to do very complex and advanced filtering when analyzing a network trace file.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download