Conduct a Network Traffic Analysis Network traffic analysis is an essential skill. By employing full-packet-capture systems, organizations record every packet of data entering and exiting their borders. Captured data is critical when investigating security incidents and answering key questions, such as what happened, how it happened, and when it happened. Occasionally, the data also answers who did it. As for answering why, unless it is self-evident (e.g., credit card numbers were stolen), IT personnel can only speculate. Besides investigations, network traffic analysis also is useful for establishing a baseline pattern for network activity. When traffic deviates from the baseline significantly, something is usually wrong. Although the cause could be any number of hardware or software problems, the system also could have been compromised. write a 2- to 3-page memo that answers Lab Assessment Questions and Answers numbers 3, 7, 8, and 9. 3. How many different source IP host address did you capture in your protocol capture?7. What are some challenges to baseline analysis?8. Why would an information systems security practitioner want to see network traffic on bothinternal and external network traffic?9. Which transactions in the lab used TCP as a transport protocol? Which used UDP? Whichports were used in the lab?
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
