100%(2)2 out of 2 people found this document helpful
This preview shows page 1 - 2 out of 4 pages.
1Introduction:In a survey of Corporation Tech uncovered a good source of compromise in the web server. The survey was issued from management due to the problems of losing too much business to a competitor who undercutting the corporation by a similar amount. The purpose of this survey is to discover the topology of the network so that a security plan can be developed in order to prevent unauthorized access, while making sure that both public and secured Web access remains available. It is important to know about security vulnerabilities there are in order to know how to prevent them on a network. Several utilities are used to determine the topology of the network. These include NetWitness Investigator, Nessus scans, and fisheye charts.Methods:The first task was to identify hosts within the network. To do this, I opened the PCAP files in NetWitness Investigator. The first PCAP file I viewed was general_comm.pcap.