Itc514 Assignment 1

Decent Essays
SUBJECT CODE - ITC514

ASSIGNMENT – 2nd

STUDENT ID – 11555225
STUDENT NAME – AJRA LOVEPREET SINGH

Task 1
Log file
A file which contains the records of all goes in and out things of a server is known as log file. For example it same as black box in airplane that records everything when a problem arises in the plane. All the time it records information in chorological order and it is stored in root directory or in a secondary directory, depending on how it is set on the server. The server administrator has access of log file because it is protected by password and server administrator has record of everyone.
Uses and methods of storing log files
1. For the purpose of troubleshooting, system administrator needs to look at log files.
…show more content…
By using who command the content of this file can be seen.

Task 2
Top ten IP addresses in log file and the numbers how many times the IP address appeared.

Description of how this pipeline works
$ grep -Eo "^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}" x06|sort|uniq –c|sort -nrk1|head >ass2.txt
The following command generates a list of all IP addresses that have attempted to connect to your web server. grep -Eo "^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}" (Folson,2008). grep /* This command match the pattern given in command*/
X06 /*It is the name of log file*/
| /*this pipe sign is used for complex things and it is also used to pass the output of one command to another as input*/
Sort /*put the lines in sequence (alphabetical order)*/
Uniq –c /*it counts the number of an command*/
Sort –nrk1 /*it compares the string numeric value*/
Head /*it prints the first 10 lines of a file*/
>ass2.txt /*this command save the output in ass2.txt

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    This dataset contains 68 compressed pcap files each containing one hour of traces. The total size of the dataset is 69 GB. The dataset from university of Georgia consists of ZeroAccess and Skynet botnet traces. The ZeroAccess is one of the most prominent P2P botnet in the recent years.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    +*Description+* As a Box Office Manager, I want to register my license key, so that I can certify my access to view and manage data within database context(s) +* In order for the user to enter a software key, which is used to verify that the user is licensed to access a database context. This is to enforce security of our application by ensuring that the user has got access to the client’s data. +*Acceptance Criteria+* □ User must be able to enter their first and last name □ User Must be able to enter a license key □ User must be able to enter their BackOffice Login ID □ User must be able to accept the End User License Agreement* □ System _shall_ validate the authenticity of the license key □ System _shall_ display an error message is the…

    • 371 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1006 Words
    • 5 Pages

    Create new scope of server, Assign scope name and description. Now define a range of IP address, start and end date Now use any excusive address that is server IP address Now select lease duration, now configure DHCP [3] options now Insert router IP address which is 192.168.1.1 in my case, press next---> Next--->activate scope now--->then finish 5) Roaming Profile [4]: For creating of centrally profile [4] of all domain users’ roaming profile [4] is use. In roaming profile we simply share and folder and assign it to all authorized domain user.…

    • 1006 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ¥ 1. An IP address is an identifier for devices on a TCP/IP network. Usually, an IP address could be assigned using a 32-bit numeric address written as four numbers separated by periods. Each number can go from being zero to 255. For example, 1.160.10.240 could be an IP address.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Along with usernames and passwords to computers is by adding usernames and passwords for individuals that need to gain access to certain files on servers. Network administrators have the task of providing each user with only the data that they need access to. If all users have access to everything on the network this serves as a security threat because if one user's credentials are compromised the whole system can become jeopardized by unauthorized…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The main purpose of such record is to categorization and timeless storage of the patient information along with maximizing interoperability between easily shareable system and secured electronic records. For a successful implementation of EHR system, there are six basic areas which need to be taken into account. The foremost being the appropriate leadership. For any kind of transformation or change implementation in an organization, influence should be in “top to down” form so as to create maximum impact on the majority class of people (Nguyen, Bellucci, & Nguyen, 2014). The leadership should be highly committed to make the implementation as an organizational priority.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hello Mrs. Brannen, Brooklyn is so excited to be in your class this year and starting her first year with GCA! I had a few questions I was wondering if you could answer or direct me to the person I need to speak with. I spoke with the Lead Kindergarten teacher a few weeks ago about moving Brooklyn up in math and adding her to the Latin course. The lead teacher sent Brooklyn's information over to the Advanced Learner Teacher and said she would be in contact with me but I haven't heard anything from her. Brooklyn has already completed a kindergarten curriculum, Sonlight Core A, Handwriting without tears K, Singapore Math K and Latin though a co-op.…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    enlightenment...during the 2017-2018 school year? I will use these word, this school year (claim) describing things I have to do to be successful, R1 You need a helpful community to succeed, R2 You need to be empowered and be confident in what you're doing, R3 You need to persevere in order to succeed, R4 You need to do your best to excel in school, R5 You should be able to be enlightened.…

    • 692 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hs515 Assignment 1

    • 1933 Words
    • 8 Pages

    Module 4- Key Assignment Jyoti. Waddigeri Professor- Dr. Susan Harman MHS515 WP- Health care information systems United States University, San- Diego. Question…

    • 1933 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    My observation for this assignment took place right before the end of the school year. I was fortunate to be paired with my favorite elementary teacher and mentor, Stacey Bingham. She teaches third grade at Lago Vista Elementary School. I enjoyed working with the students while they completed their research projects. This is a diverse class of wonderful students.…

    • 729 Words
    • 3 Pages
    Improved Essays