StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

PRJ1 Security Tool - Assignment Example

Cite this document
Summary
PRJ1 the Security Tool Ethereal is the old name, as now this popular is known as Wire shark. This open source tool is widely used for network troubleshooting and packet sniffing for on UNIX and Microsoft platforms (Ethereal. 2007). As this tool is identical to ‘tcpdump’, it has a well-structured graphical user interface with several sorting and filtration options…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
PRJ1 Security Tool
Read Text Preview

Extract of sample "PRJ1 Security Tool"

Download file to see previous pages

However, when used non-ethically, hackers can also utilize this tool to extract information of the network traffic deprived of any sort of authorization (Ethereal. 2007). Wire Shark is categorized in the list of open source tools and was released on a GNU public license. As per the GPL, the complete source code is free. The open source tool can be modified as per business requirements. The importance of this tool is significant, as securing the network requires specialized software or tool that penetrates within the network for detecting anomalies.

Previously, these specialized tools were very expensive and proprietary. However, with the launch of Ethereal, this trend has changed. Some of the functions that Wire Shark provides to its users are: As mentioned before, compatible on both UNIX and Microsoft platforms Regardless of interface type, captures network traffic and display packets on the screen Incorporates ‘tcpdump’ for displaying captured packets. . (Sharpe, Ed Warnicke et al.) As shown in fig 1.1, wire shark has captured some packets and is ready for further query. Figure 1.1 Wire shark GUI illustrates three panes.

(Sharpe, Ed Warnicke et al.) The first pane i.e. the top one is called the packet list, as it shows the summary of every captured data packet. Users can click on any one of the captured packet to get the properties that are illustrated in the next two panes. Likewise, the middle pane is comprised of tree structure that can be expanded further. (Sharpe, Ed Warnicke et al.) The further expanded properties show frame count, interface type, protocol type and TCP properties. Moreover, the upper left corner at fig 1.

1 displays a filter tab that can be used to filter the packet types, as per interest. Furthermore, new protocols can also be added, as it is an open source tool and they can be called as modules or can be constructed in sources. (Sharpe, Ed Warnicke et al.) Some of the protocols that are not common and can be added in the tool are 802.1q Virtual LAN, 802.1x Authentication, AFS (4.0) Replication Server call declarations, AOL Instant Messenger, ATM, ATM LAN Emulation, Ad hoc on-demand Distance Vector Routing Protocol, Ad hoc on-demand Distance Vector Routing Protocol v6 etc.

(Sharpe, Ed Warnicke et al.) Platforms that the tool supports other than UNIX and Microsoft are AIX, Debian GNU/Linux, Slackware Linux, Red Hat Linux, FreeBSD, NetBSD, OpenBSD, HP/UX and Sparc/Solaris. Figure 1.2 As shown in Fig 1.2, the wire shark capture menu shown multiple options i.e. interfaces, options, start and capture filters. The interface option provides users an opportunity to add or remove network interfaces

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“PRJ1 Security Tool Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
PRJ1 Security Tool Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1455760-week
(PRJ1 Security Tool Assignment Example | Topics and Well Written Essays - 750 Words)
PRJ1 Security Tool Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1455760-week.
“PRJ1 Security Tool Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1455760-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF PRJ1 Security Tool

Prototyping in Information Systems

How the process works existing tithe purchase Purchase department creates the purchase order and sends a cocoon oft to vendor and ache out payable department Purchase department confirms schedule of goods the to the vendor to vendor Vendor sends the goods which are receive organization's security where the goods are received along with the invoice The security gate/person receiving the goods stamps the receipt and provides the t back to vendor for claiming he payment at account payment department The invoices for a day are bundled together and sent to the account payable department for subsequent payments to the vendor submits the received stampede d claims to account payable department The account payable department consists of 120 staff, who have the primary responsibility to ensure that the payments are credited on time after they receive the claims from vendors and subsequent matching with the purchase orders are done The whole matching rotche at account payable department is manual and at times some claims take as long as 20 days to process and the 5% errors in the matching processors quite frequent are considered an acceptable organization is consider expanding its operations and brainstorming at various levels has suggested that the account payable department is one of the major bottlenecks in expanding its operations....
7 Pages (1750 words) Essay

Acorn RISC Machine Processors

The writer of this essay aims to represent an overview of ARM processors.... The research includes the brief history of development and prototypes, and processors' structure description relative to other contemporary processor architectures.... hellip; Acorn (or later Advanced) RISC Machine (ARM) uses a 32-bit RISC (reduced instruction set computing) processor architecture that is utilized within many different applications....
4 Pages (1000 words) Essay

Management Information Systems

This essay talks about the development of a new system for the ABC Company.... This company is computer hardware manufacturer that carry out product for larger scale orders.... The overall management and handling of such huge orders are difficult through the manual order processing approach.... hellip; The developed information system is an online website that will be used for online product sales and dealing....
16 Pages (4000 words) Essay

Psychological stress

This study "Psychological stress" is focused on identifying how different personalities, Type A and B, physiologically respond to stressful activity in the workplace.... Psychological stress is a widespread problem and is believed to be a pathway for disease.... hellip; Work-related stress is a dangerous physical and emotional response that occurs when the requirements of the job do not match abilities, needs, or resources of the workers....
6 Pages (1500 words) Research Paper

Definition of Facility Management

The paper focuses on the safety and security of businesses and people.... In the hotel industry, these factors can be listed as the building design and structure, location, comfort, furniture, equipment, parking facilities, safety, security, accessibility, additional facilities like gaming zones, parks, pool, spa and massage parlors, children's play area, etc....
9 Pages (2250 words) Term Paper

Secret of the West Chester Movie Theatre

This report will provide the Secret of the West Chester Movie Theatre during the Great Depression of 1929.... While many workers were unemployed, amid the economic hardships the sales of the West Chester movie theatre tickets increased during the difficult years.... What is the key to this phenomenon?...
10 Pages (2500 words) Research Paper

Residential Property Analysis and Valuation

This assessment, Residential Property Analysis, and Valuation is a Pro-forma report and presents a real estate analysis through facts, estimates, and statistics based on research.... However, other factors influencing real estate markets can cause wide fluctuations in expected values.... hellip; This report is intended to relate the property estimate to current market standards and trends, within a greater context of risk management for the property....
11 Pages (2750 words) Term Paper

Banana Splits and Policy Changes

The Caribbean countries are now facing global competition in the European market and are finding it exceedingly difficult to stay competitive and meet the employment and food security needs of their rural population.... The current term paper "Banana Splits and Policy Changes" highlights the impact of policy changes on the banana trade from the ACP states to the EU....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us