INT 2681 LAB 2….

 

  1. omplete Netlab 2 and submit your lab summary here.

    NETLAB 2: A. Reconnaissance With Hping/ Creating and Installing SSL Certificates. 

    1. Using hping as an ICMP utility 
    2. Using hping for port scanning. 
    3. Create a Self Self-signed certificate 
    4. Configure Apache SSL File. 
    5. Testing SSL Certificate. 
    6. NETLAB 2: B. Vulnerability Scanning With Openvas. 
    7. OpenVas initial Setup 
    8. Scanning with OpenVas 
    9. Customized Scanning with OpenVas 
    10. Which other tools can be used for vulnerability management? 
    11. NETLAB 2. C. Network Analysis/VNC As A Backdoor. 
      1. Capturing Traffic with tcpdump 
      2. Analyzing Traffic with Wireshark 
      3. Using TightVNC 
      4. Reversing VNC Connections 
    12. SAMPLE SCREENSHOT.pdf

  ASSIGNMENT SUBMISSION

  1. Text SubmissionWrite Submission
  2. Attach Files  
  3. SafeAssign accepts files in .doc, .docx, .docm, .ppt, .pptx, .odt, .txt, .rtf, .pdf, and .html file formats only. Files of any other format will not be checked through SafeAssign.
  4. Plagiarism Tools I agree to submit my paper(s) to the Global Reference Database

  ADD COMMENTS

  1. CommentsFor the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).P0 WORDSPOWERED BY TINY

 

MS Access

 

  1. Describe Microsoft Access and its components (tables, relationships, forms, queries, reports).
  2. Distinguish key differences between ACCESS and EXCEL.
  3. Give a brief overview of the case study.
  4. Evaluate the ACCESS features that enabled Ken Steward to develop the daily product inspection database without programming experience or expertise.
  5. Explain the responsibilities of a database administrator as they relate to assuring data security and integrity.

 

Writing Requirements

  •  4-5 pages long. Double Space.
  • Must have an introduction with a clear thesis statement, three to four main points, and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views.
  • Use at least 2 academic books and 3 scholarly articles from a library database or software manufacturer’s website.
  • Use APA style for in-text citations, and references
  • Use the Databases and APA template located in the Student Resource Center to complete the assignment.

Final paper on “Measures to Reduce Data Dump in Minimal Time”

  1. Research Paper Presentation  
    • With the information you gathered for your Research Paper, you will now create an intriguing visual presentation and present it to the class.
    • Presentation should include following slides-
    • Introduction (1 slide)
    • literature review (2 slide)
    • Analysis of the literature (1slide)
    • Discussion paragraphs 1, 2, 3 (2 slide)
    • Conclusion (1slide)
    • Title page and reference list (2 slides)
    • Your presentation should be between 5-7 minutes long; practice it several times beforehand!

300 words

 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

computer architecture jan 24

Read the Moore’s law then summarize briefly the law, mainly address the following two questions :

  • What can we conclude from this law ?
  • How is this law can guide the computer evolution ?

Write your original post 

Discussion 300 words

 Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure  our most precious data? Please explain your answer. 

Linux Firewall Exploration Lab

Task 1: Using Firewall

Task 2: Implementing a Simple Firewall

Task 3: Evading Egress Filtering

Task 3.b: Connect to Facebook using SSH Tunnel.

Task 4: Evading Ingress Filtering

IT207 week 6

200 words each
question 1

What are the main distinctions between the ways Windows 10 and CentOS 7 treat file extensions?

Question 2 

What are the benefits of using a temporary storage location, such as a Recycle Bin, to hold deleted files? Are there any disadvantages?