You are hired by an organization to analyze packet captures from a wireless network. You are looking to assess if the captures pose a threat.
Analyze the packet captures provided by Wireshark by doing the following:
GET ANSWER FOR THIS PAPER AT https://bestwriters.org/order
Visit the Gitlab SampleCaptures webpage to download the following:
wpa-Induction.pcap.gz Wi-Fi 802.11 WPA trafficwpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey samplenb6-hotspot.pcap Someone connecting to SFR’s wireless community networkciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0 wap_google.pcap contains two WSP request-response dialogs
Note: Only download these sample captures. Other captures may set off your computer’s system defenses.
GET ANSWER FOR THIS PAPER AT https://bestwriters.org/order
Use Wireshark to view and analyze the sample captures.
Create a 1- to 2-page table that ranks the packet captures from the highest to lowest threat. In your table, provide the following for each packet capture:
Description of the trafficDescription of the risks, if any, the traffic poses to the wireless networkCountermeasures to take to secure the network from any threat
GET ANSWER FOR THIS PAPER AT https://bestwriters.org/order
Write a 2- to 3-page memo to management as a network security specialist, and ensure you do the following:
Explain how to distinguish hostile packet data from normal packet data.Explain how to recognize any attack signatures in the packets you analyze.Provide a rationale for ranking the packets as you did.
GET ANSWER FOR THIS PAPER AT https://bestwriters.org/order
Format any citations according to APA guidelines.
Bottom of Form