14 Jan Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap. B. ?Summarize the vulnerabilities on the network and their potential implicat
A. Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.
B. Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.
C. Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with each anomaly.
D. Summarize the potential implications of not addressing each of the anomalies found when running Wireshark.
E. Recommend solutions for eliminating or minimizing all identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations for each vulnerability or anomaly.
F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
G. Demonstrate professional communication in the content and presentation of your submission.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.
B. Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.
C. Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with each anomaly.
D. Summarize the potential implications of not addressing each of the anomalies found when running Wireshark.
E. Recommend solutions for eliminating or minimizing all identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations for each vulnerability or anomaly.
F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
G. Demonstrate professional communication in the content and presentation of your submission.
Rubric;
A:NMAP SUMMARY
COMPETENT Answer
The submission accurately describes the network topology and includes screenshots showing evidence of running Nmap.
B:NMAP VULNERABILITIES
COMPETENT answer
The submission accurately summarizes the vulnerabilities on the network, and provides plausible potential implications.
C:WIRESHARK ANOMALIES
COMPETENT answer
The submission accurately describes the anomalies found when running Wireshark and includes evidence of the range of packets associated with each anomaly.
D:IMPLICATIONS OF ANOMALIES
COMPETENT answer
The submission summarizes the potential implications of taking no action for each anomaly, and the provided implications are plausible.
E:SOLUTIONS
COMPETENT answer
The submission recommends solutions that eliminate or minimize all identified vulnerabilities and anomalies. The recommendations are supported by reliable research and sources.
F: SOURCES
COMPETENT
The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.
COMPETENT
Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.
,
Skillable Labs
kthometz posted on 02-22-2022 12:01 PM 12-15-2023 11:52 AM
Labels:
Terminology
· Lab instance: When a lab is launched for the first time, a lab instance with a unique instance ID is created. This ID can be found under the Help tab in your lab.
Figure 1. Skillable labs Help tab, highlighting the location of the instance ID.
· Save l ab: Lab Instances may be saved to be resumed later for up to 14 days by using the link in the performance assessment. Note: If lab instance is not resumed within 14 days, the instance will be terminated.
· Resume lab: Saved lab instances may be resumed and the same instance ID remains.
· Clock timer: Timer begins to count down when lab is launched.
· The lab instance may be extended for 120-minute increments until 50% of the initial duration is met.
· For example, if the lab is initiated and the timer begins to count down from 4 hours remaining, when extended, it will be for 2 hours and cannot be extended again because 2 hours is 50% of the initial duration
· Another example is if the lab is initiated and the timer begins to count down from 8 hours remaining, when extended, it will be for 2 hours, then again until the 4 hours (50% of the initial duration) is met.
· When the lab runs out of time after the extension, the lab will be disconnected and work will be irretrievable. Figure 2: Skillable labs, highlighting location of of time remaining/duration.
Lab Behaviors and Impacts
The behaviors and impacts listed below are the result of actions taken in the “hamburger" or options menu, or end of instructions.
Figure 3. Skillable labs, highlighting the location of the 'hamburger'/options menu.
· End lab
· Impact: Lab is ended and lab instance cannot be retrieved.
· Save lab
· Impact: Lab instance is saved.
· Exceptions:
· Lab instance cannot be saved if there is no more time left to extend (for example, past 150% of initial duration).
· The time remaining on a lab can be found under the title, as noted in Figure 2 above
· Lab instance cannot be saved if there is less than 5 mins remaining on the timer clock.
· User would need to extend first to add clock over 5 mins and then save.
· Lab is left running without proper shut down
· Impact: Lab instance remains active and runs down clock timer until Auto-save or save/cancel is triggered
· User closes the browser tab
· Impact: Lab instance remains active and runs down clock timer until Auto-save or save/cancel is triggered
· User allows clock timer to run out of time
· Impact: Lab instance is removed and is not retrievable by Skillable®.
Automatically Enrolled Resources
Textbook
Content will be drawn from the following textbook:
Doherty, J. (2022). Wireless and Mobile Device Securit (new tab)(opens in new tab) . Boston, MA: Jones & Bartlett Learning. ISBN: 9781284211733
Supplemental Videos & Labs
· Bagurdes, R. (2018). Getting Started with Wireshark(opens in new tab) ((opens in new tab) new tab)(opens in new tab) . Pluralsight.
· Cyber Security Fundamentals. [n.d]. Practice Labs.
· Glass, M. (2018). Getting Started with Nmap (opens in new tab) (new tab)(opens in new tab) . Pluralsight.
· Helmick, J. (2018). Security Awareness: Mobile Devices (new tab).(opens in new tab) Pluralsight.
· Mobile Security. [n.d] ITProTv.
· Practice Labs Introduction to Wireshark. [n.d]. Practice Labs.
· Run a Network Scan Using Nmap [Guided]. [n.d.]. Percipio.
· Shore, M. (2021). Ethical Hacking: Wireless Networks (new tab)(opens in new tab) . LinkedIn Learning.
image2.png
image3.png
image4.png
image1.gif
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.