CYB 240 Module Two Lab Worksheet-JohnHensley(1)

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

240

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by BarristerFlowerWalrus17

Report
CYB 240 Module Two Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Attacking Webservers From the WAN
Prompt Response In the lab section “Altering the Website,” Step 25 , when you type “Hacked Web Server” include your name after the text “Web Server” and provide a screenshot of Step 24. In the lab, you covered up the tracking of access to the log files by deleting lines within the Access.log file. What other types of controls could be put in place to identify that these changes occurred? What other types of Types of controls: Security Information and Event Management known as SIEM File Integrity and Change Monitoring known as FIM Types of security measures: Security measures include removing unnecessary services, using SSH keys for authentication to the server network, and deploying a WAF or Web Access Firewall.
Lab: Breaking WEP and WPA and Decrypting the Traffic
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help