Question

We shall, for the hypothetical purposes of the workshop/tutorial, consider a number of computers of ACorp...

We shall, for the hypothetical purposes of the workshop/tutorial, consider a number of computers of ACorp have been accessed by an external group of unknown persons, to be hazardous to the remainder of the computers on the network. Your client - ACorp - has a large network of desktop and server computers that span a reasonably complex network.

For your client, prepare a couple of paragraphs and references (urls, documents) for each of the following tasks (can be business language high level and/or technical detail at low level);

PART 1

Logging traffic Find relevant techniques or recommendations for systems that allow logging the unusual traffic. How can unusual traffic be logged? What tools or software can be deployed?

PART 2-

Analysis of traffic Find relevant techniques or recommendations or organisations that allow for analysis of the unusual traffic. It may not be possible to analyse this traffic effective internally to your organisation, who would approach for help?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Part - 1

The traffic on a network can be logged using various networking techniques, these techniques will be well known to network engineers and system admins of the network. In the primary stage first of all you need to create a map of all the known devices that belongs to your network.this can be done by identifying them with their IP and MAC address, you should keep these devices in the allowed list of devices that are supposed to access traffic of your network.Next step is to identify and log the unknown devices that are accessing your network.There are many network monitoring tools easily available in the market to perform such task, these devices can identify unusual traffic by any unknown device using their IP and MAC address.You should consider buying a licensed version of these tools to avoid any shortage.

Part - 2

To analyse the traffic and the type of data being sent or recieved over the network, first you need to inspect any suspecious traffic. Because if there are huge no. of devices in your n/w , you cannot monitor all of them.so use some network monitoring tools and identify any outsiders that are accessing your network.

The next step is analyzing data packets which are being sent or recieved through your network. Packets are basically a chunks of byte data which collectively creates stream of larger data set like videos and audios.To analyze the data over the network, the most common technique is Packet sniffing.packet sniffing can be done with the monitoring tools that can be installed on your network router or server. using this technique you can see through the kind of data being circulated over the network and you can figure out the suspicious traffic in your network.contact your network engineers to implement these changes in your network.If your organisation don't have such resources then you can outsource the resources from the organisations who are having expertise in providing networking services.

Add a comment
Know the answer?
Add Answer to:
We shall, for the hypothetical purposes of the workshop/tutorial, consider a number of computers of ACorp...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • READ QUESTION FIRST! We shall, for the hypothetical purposes of the workshop/tutorial, consider a number of...

    READ QUESTION FIRST! We shall, for the hypothetical purposes of the workshop/tutorial, consider a number of computers of ACorp have been accessed by an external group of unknown persons, to be hazardous to the remainder of the computers on the network. Your client - ACorp - has a large network of desktop and server computers that span a reasonably complex network. For your client, prepare a couple of paragraphs and references (urls, documents) for each of the following tasks (can...

  • We shall, for the hypothetical purposes of the workshop/tutorial, consider a number of computers of ACorp...

    We shall, for the hypothetical purposes of the workshop/tutorial, consider a number of computers of ACorp have been accessed by an external group of unknown persons, to be hazardous to the remainder of the computers on the network. Your client - ACorp - has a large network of desktop and server computers that span a reasonably complex network. For your client, prepare a couple of paragraphs and references (urls, documents) for each of the following tasks (can be business language...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT