IT Security: Packet Analysis and HTTP Security Assignment

Verified

Added on  2022/09/09

|6
|1038
|15
Homework Assignment
AI Summary
This assignment solution addresses key concepts in IT security, focusing on packet analysis and sniffing techniques. It explains how packet analysis/sniffing is an active technique used for data breaches, the role of the `sudo` command in Wireshark for managing security privileges, and why HTTP packets are examined to retrieve usernames and passwords. The solution also explores the availability of usernames and passwords in HTTP POST packets and provides suggestions for assessing and improving the security of login pages, including the use of firewalls. The assignment highlights potential security risks and methods to mitigate them, with references to relevant research papers.
Document Page
IT 0
IT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT 1
Table of Contents
Question 1...................................................................................................................................................2
Question 2...................................................................................................................................................2
Question 3...................................................................................................................................................2
Question 4...................................................................................................................................................3
Question 5...................................................................................................................................................3
References...................................................................................................................................................5
Document Page
IT 2
Question 1
It is determined that packet analysis/sniffing is an active technique that is mainly used by
hackers for performing data breach and hacking activities effectively. Most of the criminals
use active sniffing process in which they transfer the fraud and spam signals to the
computing networks and obtain the reliable and personal information of the users and
companies (Karpiński, et al., 2017). In terms of security attacks, sniffing is a major attack
that has the capability to reduce the performance of computing devices and provide a way
to reduce confidentiality and gather personal data in less time. Packet sniffing mainly
contains malware networks and malicious codes that help to produce larger traffic signals
and perform security threats in the case of computing devices (Trabelsi, 2014). So, it is
significant for the business communities to control and handle such issues from the
computers in order to enhance the privacy of data.
Question 2
The term Sudo is a kind of computing program which is mainly used in Linux programming
that enables companies to run developed programs with security privileges of others. It is
mainly designed and implemented in the computing networks to run commands only as of
the superuser. It is determined that while executing Wireshark, the sudo program is used
due to its capability to control and handle the vulnerabilities and threats from the
programs and provide a way to securely perform the developed codes. If the consumers do
not use the sudo process in the Wireshark the unwanted or security threats can be
occurred in the computing programs that can help the criminals to obtain sensitive data
and produce hacking issues. So, it is significant to use Sudo codes while developing and
implementing programs in the Wireshark network.
Question 3
It is determined that HTTP is a major part of the login page that contains all information
and details of the users and also contains login credentials. It also helps the users to control
and reduce the security threats and protect usernames and passwords of the consumers in
Document Page
IT 3
an effective manner (Choi, et al., 2014). The HTTP server contains an encryption process
that converts passwords and usernames of the consumers in the codes that cannot be
hacked by the criminals easily. In order to handle the security concerns and protecting data
from the criminals, it is significant for the consumers to look into HTTP data packets in
order to retrieve the username and password that was transferred by the login page.
Therefore, it is highlighted that security threats and risks are major concerns for doing
such processes and steps while accessing personal accounts in the web servers and many
consumers use such processes in the computing networks. From a recent study, it is
determined that the criminals transfer the traffic signals and use malware networks which
are capable to detect the sensitive information from the web pages and help criminals to
detect the login credentials of the users (Elamaran, et al., 2018). Therefore, it is necessary
for the users to manage and secure usernames and passwords from the criminals in order
to protect data against cyber-crimes and security attacks.
Question 4
It is examined that the HTTP servers contain the authentication request which is capable to
control and reduce the traffic and fraud signals from the main servers. Moreover, the HTTP
server contains the login credentials of the users in order to protect from the criminals and
helps the users to manage the username and passwords effectively. Therefore, using HTTP
authentic servers, personal information including username and password can be
protected effectively and login in less time while accessing accounts in the web servers.
Question 5
Security is a major challenge for the companies as the criminals transfer the traffic signals
that cannot be detected by the users easily. In order to assess the security of the login page,
the individuals require capturing the unwanted and trafficking signals for which they can
use security tools like antivirus and firewall networks. A firewall is an effective security
tool that has the capability to detect the traffic signals and malware networks from the
servers easily and helps to manage the cyber-crimes in an appropriate manner. The first
suggestion for improving the security of the web page is to enable firewall-based cookies
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT 4
by which the malicious codes can be detected and after that, the users should disable the
servers from the computing networks for protecting sensitive data.
Document Page
IT 5
References
Choi, J., Choi, C., Ko, B. and Kim, P., (2014) A method of DDoS attack detection using HTTP
packet pattern and rule engine in a cloud computing environment. Soft Computing, 18(9),
pp.1697-1703.
Elamaran, V., Arunkumar, N., Babu, G.V., Balaji, V.S., Gómez, J., Figueroa, C. and Ramirez-
González, G., (2018) Exploring DNS, HTTP, and ICMP response time computations on brain
signal/image databases using a packet sniffer tool. IEEE Access, 6(2), pp.59672-59678.
Karpiński, M., Korchenko, A., Vikulov, P., Kochan, R., Balyk, A. and Kozak, R., (2017) The
etalon models of linguistic variables for sniffing-attack detection. In 2017 9th IEEE
International Conference on Intelligent Data Acquisition and Advanced Computing Systems:
Technology and Applications (IDAACS), 1(1), pp. 258-264.
Trabelsi, Z., (2014) Enhancing the comprehension of network sniffing attack in information
security education using a hands-on lab approach. In Proceedings of the 15th Annual
Conference on Information technology education, 12(6), pp. 39-44.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]