IT Deployment and Security Experiences CIS 3100.docx - 1...

This preview shows page 1 - 3 out of 10 pages.

1CIS 3100 Network Security AnalysisAssignment GuideThis guide provides a two part IT experience for undergraduates and those learningprofessional IT. Students will use it to conduct an investigation into the access control andgeneral privacy of a home-based IT network, involving wireless fidelity (wifi) protocols.Internal Network InspectionRouter Inspection, WiFi Network IntegrityObtain the IP address for your personal computer. On a macintosh, you will use the commandline, or Terminal Utility. On a windows machine, you will utilize your command prompt. You mayneed to research/google how to find your IP address, using the ifconfig (mac) or ipconfig utility,but in general one runs it from your command prompt or Terminal command line, as below.Determine the address of your router configuration page, over IP. Your IP is theinetvalue in thesecond interface, after the loopback, or l0, which is an interface that allows your computer toping itself. In the above screenshot, the IP is 192.168.2.26, implying that there are 25 other IP-addressable devices in your home, which have recently taken out an IP from your home router,
2what is called a ‘leased’ IP.ICMP ProtocolsThe purpose of the ping, or ICMP protocol is to prove that a device is reachable through thecurrent network setup. If something cannot be pinged, it implies that some failure is takingplace, preventing the device from reaching you. It only represents the start of a troubleshootingprocess, or it represents the completion of the process of joining a device to a network. ICMPworks over the broader internet, in the same manner that it works locally in your private wifi,unless the protocol of ICMP is disallowed by your router or personal computer.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 10 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
Haji
Tags
Computer network, IP address, Virtual private network, Wi Fi, Transport Layer Security

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture