ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 27 Apr 2017 My Price 9.00

compilation of the monthly anomaly activities on the network

Read through the report

Write a short evaluation outlining the ethical violations you believe you have found. Describe why they are ethical violations. Be sure to consider all perspectives, not just those of one side (the company) or the other (the employees). Reference any code of ethics you are using. 

Use either the Acceptable Use Policy of the company you work for or, if there isn't one, use the SANS policy

 

Network Analysis Report
August 2014
Analyst: Ric Messier, GSEC, C|EH, CISSP ABSTRACT
This is a compilation of the monthly anomaly activities on the network. Introduction
The YoYoDyne Propulsion Systems network has started to become overly congested at
certain times of the day so management has decided to perform some packet capture and
analysis on the network. The goal is to determine areas where there can be improvements
made to the network. This will also help management understand where there may be
misutilization of the network. The results reported here are for the month of August, 2014. Results
The following are areas where there was a lot of excess bandwidth use because of unusually
large downloads. A number of downloads from www.ea.com. This included URLs that reference sims3, battlefield-3 and mass-effect-3. The majority of these downloads were to a single
IP address – 172.17.19.203 Large downloads from the Apple network including URLs referring to iTunes with
file extensions ending in .aac and .m4v. Large downloads from Microsoft with file extensions ending in .exe. A lot of
bandwidth was consumed on August 12 & 13, 2014. While it didn’t impair our
network connection, it was a lot of bandwidth used across those two days. Large file downloads throughout the month from Ubuntu.com as well as redhat.com.
These were in the multi-gigabyte range per download. Last.FM and Pandora were large consumers of bandwidth across the company. There was a lot of activity to Dropbox.com and less to Box.com throughout the
month.
There was a lot of activity to Webmail sites. Some usernames and passwords were
captured. They are listed in the table below.
Username
James.walker@gmail.com
juniorbarnes@live.com
Alpha1@scramble.com
foulthings@freewebmail.com
me@me.com
foo@foo.com Password
P4ssw0rd!1
B111C05by%
MyPassword123
Passwords
Me123ABC$
F00ness1! There was a lot of activity to banking sites and there were banking account numbers as well
as some usernames captured but these have been left out of the report due to their
sensitive nature. There was a lot of activity on Twitter, Facebook and LinkedIn throughout the month. While
Facebook activity came from IP addresses across the company, the majority of Twitter use
resolved to a small number of IP addresses on the floor where sales, marketing and
customer service are.
There was a lot of activity to ESPN, primarily from the floor where sales is located and most
of the activity took place in the morning, though in the early part of the month there was a
lot of activity all day long. Conclusions
YoYoDyne Propulsion Systems would benefit from implementing a caching proxy server.
This would allow content to be cached at the proxy, reducing the amount of bandwidth
being consumed to our service provider. It would also allow us to restrict access to
particular sites that we felt offered risk to us.
One area not considered for this activity was e-mail exchanges. This should be evaluated as
well.

Attachments:

Answers

(11)
Status NEW Posted 27 Apr 2017 02:04 AM My Price 9.00

-----------

Attachments

file 1493259660-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)