95%(97)92 out of 97 people found this document helpful
This preview shows page 13 - 17 out of 17 pages.
To include all you would replace the IP address with ‘[0-9]+\.[0-9]+\.[0-9]+\.[0-9]’ to filter all the IP addresses. Based on the filters you completed in this appendix, how many addresses were found, and what were those addresses? There were only two addresses found 10.0.250.200 and 10.0.250.161Which IP address had the highest count of request? 10.0.250.161Which IP had the highest request to the web server?
15Incident ResponseAfter analyzing there was a discover of a possible threat to the network. With the implementation the BYOD the likelihood of a threat has increased and therefore the security mechanisms used must also. Monitoring the employee activity and performing audits will lower the chance of an inside threat and being able to counter the attack faster in case of one. It is also important to follow a continuous plan that will ensure proper encryptions, updates to the software and protection techniques against outside threats, for example signal- hiding. If this plan is followed the company will have a successful BYOD program.Bibliography
16Incident ResponseChauhan, A. (n.d.). Internet Control Message Protocol (ICMP) | Computer Networks . Retrieved from Choi, M.-k., Robles, R. J., Hong, C.-h., & Kim, T.-h. (2008, July 3). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. Retrieved from He, B., Hägglund, J., & Gu, Q. (n.d.). Security in Ad Hoc Network . Retrieved from NET.pdfLooper, C. (2017, January 9). What is TCP/IP and How Does it Work? . Retrieved from PCMech: Ogden, J. v. (2018, June 12). Monitoring for Suspicious Network Activity. Retrieved from CIMCOR: ProTech Cyber security. (n.d.). Retrieved from -cybersecurity-kill-chain-process/Rouse, M. (n.d.). UDP (User Datagram Protocol) . Retrieved from Tanwar, S., & K.V., P. (2013, January 6). Threats & Security Issues in Ad hoc network: A Survey Report. Retrieved from TechTerms. (n.d.). HTTP. Retrieved from UMUC. (2017). UMUC. Retrieved from ?keyword=Bring%20Your%20Own%20Device%20(BYOD)
17Incident ResponseWong, S. (2003, May 20). The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards. Retrieved from -room/whitepapers/wireless/evolution-wireless-security-80211-networks-wep-wpa-80211-standards-1109