Create a report based on your findings; include what changes you could make to fix those problems. What to include in the report: Executive overview: an overall summary of what was done, key findings...

1 answer below »

Create a report based on your findings; include what changes you could make to fix those problems.


What to include in the report:



  • Executive overview: an overall summary of what was done, key findings and recommendations

  • Analysis: identify what network traffic was seen on the network and what activity was taking place.

  • Security analysis: what insecurities were identified?Was there any malicious traffic?Was any sensitive information seen in the traffic?

  • Recommendation(s): what can be done to fix problems identified in the security analysis?

  • Summary – estimate the requirements and time needed to make the recommended changes.Include any other findings here.


The overall report should be about 5-10 page.






analize a pcap file with wireesharck

Answered Same DayMar 29, 2021

Answer To: Create a report based on your findings; include what changes you could make to fix those problems....

Amit answered on Apr 12 2021
157 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 4/12/2020
Table of Contents
1.    Executive overview    3
2.    Security analysis for sensitive information and malicious traffic    3
3.    Analysis of network traf
fic and performed activities    6
4.    Recommendations for fixing security problems    9
5.    Conclusion summary of findings    9
6.    References:    11
1. Executive overview
The packet analysis for implemented network is critical task and all possible threats and risks to network traffic are mainly identified with it. There are different tools used for network packet analysis and Wireshark is very popular because of free availability and open source nature. The provided file shows the Telnet based communication with implementation of protocols like TCP, SMTP, FTP and IMAP etc. The complete analysis of the provided network file is done to protect the sensitive data of this network and making the recommendations for fixing the security problems in the presented network. The cross platform activities of this wireshark tool are used mainly for making analysis of the provided network. The graphical front end of wireshark provides effective filtering of malicious issues and allows us to sort them in required order. The promiscuous mode of this allocation is for verification of interface controls set over the provided network. The used protocols on the provided networks are used for identification of MAC addresses, so that traffic visibility of provided network can be monitored. The network switches and respective taps are also verified for identification of malicious activities. The monitoring mode of wireshark allows easy analysis of network and provides monitoring facilities for identification of malicious traffic.
2. Security analysis for sensitive information and malicious traffic
The security analysis for sensitive information and malicious traffic is mainly completed in this task. The identification of malicious traffic is big challenge for any network implementation. As this provided network is making use of private IP, so, all other IP from the set range are creating malicious activities to this network. The packets requiring retransmission because of data loss are mainly requiring identification as; these packets can contain sensitive information. The screen shot of provided network for security analysis through wireshark is provided under:
This file shows the TCP implementation for packet exchange. The provided responses, requests, their...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here