Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…
Answer these questions based on the rules What would you do if someone threatened to DDoS/DoS the server: I would mute or either ban them. Threatening to DDos is a bannable or mutable offence! What would you do if you caught someone x-raying and they admitted it: I would give them a reduced ban for admitting and giving me less time to SS!…
To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…
Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…
Frequently when responding to an event, first responders are not there for a prolonged period of time. For example: Firefighters are usually fighting a fire for 30 minutes to an hour. However, during the event of the WTC attack, that was not the case. First responders were on-site of hours or even days, those that had PPE found that specific items were hindering them from doing their jobs. According to Jackson et al.…
2) Network traffic shows that hundreds of hosts are constantly sending only SYN packets to a single Web server on campus. a. This type of traffic suggests a SYN flood attack, which according to Techtarget (http://searchsecurity.techtarget.com/definition/SYN-flooding) is when half-open connections are attempted by the user only sending SYN packets. The server will respond with SYN/ACK packets (on open ports), but the client ignores them and re-sends SYN packets. This means the server cannot handle legitimate traffic when needed. Similar to #1 above, IDS and IPS devices can detect all of this traffic and an IPS can drop the packets before they get to the target server after the pattern is recognized as an attack.…
Since 2001, the United States special operations forces have been fighting the war on terror. It remains the longest war in American history. The decision to go to war with Iraq was unpopular with the American people, and for those who supported it in congress faced a political backlash. The president received authorization from Congress to declare war on Iraq due to their alleged involvement in the Sep 11 attack and their alleged possession of Weapons of Mass Destructions. On May 19, 2003, President George W. Bush addresses the nation from the Oval Office announcing the beginning of Operation Iraqi Freedom.…
Answer. Yes, Target story does indeed follow the general “ATP kill chain” attack model as clearly elaborated upon in the case study. Attackers started by performing“Reconnaissance”over one of Target’s external heating and ventilation providers, Fazio Mechanical Servicesprobably after prior deep investigation to detectan easy loophole to infiltrate Target’s network for its malicious objectives. Also,Fazio relied onfree version of a security software called, “Malwarebytes Anti-Malware”, whose license explicitly prohibited corporate use; which is a fineexample of Overreliance on knowledge versus intelligence.…
Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…
Question #1: What would be your response to the order? Explain in detail. My first response towards the operation order is to question the necessity of forcefully removing local evacuee from their homes and destroying their property if they refuse to evacuate. Then explain to the commander that this type of action is prohibited and in clear violation of the Law of War. My second response will be to advice that the operation order be revised before the execution of the order because the destruction of civilian property unnecessary and cannot be justified under military necessity.…
A Broken System Perry B Keaton Case Study - 1 Instructor: Ryan Wentworth October 12, 2015 A Broken System-1 Many filled that the two crucial incidents that occurred in our history could have been avoided if we had paid attention to the warning signs. Are the national systems that we are using the blame for these occurrences? There are so many questions that need to be answer to why the following g disaster had to happen. I am speaking in reference to the Pearl Harbor Attack and 9/11.…
On April 16, 2007 a student at Virginia Tech murdered and injured a large number of fellow students and faculty. Prior to the incident, he had displayed signs of violent thoughts and behavior to his instructors. As a younger child, he had also been troubled. However, at that age, he had received psychiatric help due to his parents’ involvement (Virginia Tech Review Panel). It is possible that if he had received help as an adult, this crisis could have been avoided.…
“Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…
The DNS is a worldwide distributed directory service, and as such, is an indispensable part of the functioning internet (Hurter, 2011). The final tool we covered was traceroute, used for computer network diagnostics by displaying the path taken and measuring transit delays in packets across an IP network. Traceroute can be used to help identify incorrect routing table definitions or a firewall which may be blocking ICMP traffic, or high port UDP. It is also used by penetration testers to gather information about network infrastructure and IP ranges around a given host (Mahajan, Spring, Wetherall, & Anderson,…
(Written by James R; not part of the actual report) The website assigned to our group was a ‘government department’ website, so we have chosen to the the Ministry of Justice website. This document is a summary of what our group has currently and collectively thought about the Ministry of Justice website. The writing in this summary report is not considered final, and is under discussion and refinement by the group. Topics covered in the report include the target audience and website appeal to the target audience, page layout, browser compatibility, navigation, use of colour and graphics, multimedia, content presentation, functionality, and accessibility.…