CYB360 Wireless Security Phoenix University Packet Capture Analysis HW You are analyzing packet captures from a wireless network to assess if the captures

CYB360 Wireless Security Phoenix University Packet Capture Analysis HW You are analyzing packet captures from a wireless network to assess if the captures pose a threat, what risks, if any.

For this assignment, analyze the packet captures provided by Wireshark by doing the following:

Don't use plagiarized sources. Get Your Custom Essay on
CYB360 Wireless Security Phoenix University Packet Capture Analysis HW You are analyzing packet captures from a wireless network to assess if the captures
Just from $13/Page
Order Essay

Go to the Wireshark Sample Captures site, and download the following: ATTACHED IS THE NECESSARY FILES IN A ZIP FOLDER

wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic
wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample
nb6-hotspot.pcap Someone connecting to SFR’s wireless community network
ciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0
wap_google.pcap contains two WSP request-response dialogs

Note: Only download these sample captures. Other captures may set off your computer’s system defenses.

Use Wireshark to view and analyze the sample captures.

Create a 1-page table that ranks the packet captures from the highest to lowest threat. In your table provide the following for each packet capture:

Description of the traffic
Description of the risks, if any, the traffic poses to the wireless network
Countermeasures to take to secure network from any threat

Write a 1/2- to 1-page memo to management as a network security specialist explaining the following:

How you can distinguish hostile packet data from normal packet data
How you can recognize any attack signatures in the packets you analyze
Provide a rationale for ranking the packets as you did

superadmin

Recent Posts

Consider the following information, and answer the question below. China and England are internation

Consider the following information, and answer the question below. China and England are international trade…

4 years ago

The CPA is involved in many aspects of accounting and business. Let’s discuss some other tasks, othe

The CPA is involved in many aspects of accounting and business. Let's discuss some other…

4 years ago

For your initial post, share your earliest memory of a laser. Compare and contrast your first percep

For your initial post, share your earliest memory of a laser. Compare and contrast your…

4 years ago

2. The Ajax Co. just decided to save $1,500 a month for the next five years as a safety net for rece

2. The Ajax Co. just decided to save $1,500 a month for the next five…

4 years ago

How to make an insertion sort to sort an array of c strings using the following algorithm: * beg, *

How to make an insertion sort to sort an array of c strings using the…

4 years ago

Assume the following Keynesian income-expenditure two-sector model:

Assume the following Keynesian income-expenditure two-sector model:                                                AD = Cp + Ip                                                Cp = Co…

4 years ago