To include all you would replace the ip address with

This preview shows page 13 - 17 out of 17 pages.

To include all you would replace the IP address with ‘[0-9]+\.[0-9]+\.[0-9]+\.[0-9]’ to filter all the IP addresses. Based on the filters you completed in this appendix, how many addresses were found, and what were those addresses? There were only two addresses found 10.0.250.200 and 10.0.250.161 Which IP address had the highest count of request? 10.0.250.161 Which IP had the highest request to the web server?
14 Incident Response 10.0.250.161
15 Incident Response After analyzing there was a discover of a possible threat to the network. With the implementation the BYOD the likelihood of a threat has increased and therefore the security mechanisms used must also. Monitoring the employee activity and performing audits will lower the chance of an inside threat and being able to counter the attack faster in case of one. It is also important to follow a continuous plan that will ensure proper encryptions, updates to the software and protection techniques against outside threats, for example signal- hiding. If this plan is followed the company will have a successful BYOD program. Bibliography
16 Incident Response Chauhan, A. (n.d.). Internet Control Message Protocol (ICMP) | Computer Networks . Retrieved from Choi, M.-k., Robles, R. J., Hong, C.-h., & Kim, T.-h. (2008, July 3). Wireless Network Security: Vulnerabilities, Threats and Countermeasures . Retrieved from He, B., Hägglund, J., & Gu, Q. (n.d.). Security in Ad Hoc Network . Retrieved from NET.pdf Looper, C. (2017, January 9). What is TCP/IP and How Does it Work? . Retrieved from PCMech: Ogden, J. v. (2018, June 12). Monitoring for Suspicious Network Activity . Retrieved from CIMCOR: ProTech Cyber security. (n.d.). Retrieved from - cybersecurity-kill-chain-process/ Rouse, M. (n.d.). UDP (User Datagram Protocol) . Retrieved from Tanwar, S., & K.V., P. (2013, January 6). Threats & Security Issues in Ad hoc network: A Survey Report . Retrieved from TechTerms. (n.d.). HTTP . Retrieved from UMUC. (2017). UMUC . Retrieved from ? keyword=Bring%20Your%20Own%20Device%20(BYOD)
17 Incident Response Wong, S. (2003, May 20). The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards . Retrieved from - room/whitepapers/wireless/evolution-wireless-security-80211-networks-wep-wpa-80211- standards-1109

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture