IT411_ERIC_CLARKSON_UNIT_9_ASSIGNMENT

.docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

411

Subject

Information Systems

Date

May 20, 2024

Type

docx

Pages

5

Uploaded by Newera87

1 Unit 9 Assignment IT411 Digital Forensics Eric Clarkson Purdue Global University Professor Louay Karadsheh October 24, 2023
2 What are some things you can use to protect network traffic from being sniffed if you are forced to use unsecure protocols that transmit data in clear text? Network users and administrators must protect network traffic from interception. Even when unsecure protocols that carry data in clear text are utilized, some measures can be used to protect network traffic from eavesdropping. In this piece, we will look at some of the safeguards that may be put in place to prevent network traffic from being sniffed. The first approach is to utilize a virtual private network (VPN). A VPN encrypts network traffic and routes it through a secure tunnel, making it impossible for anyone to intercept the data. This is especially important for people who frequently use public Wi-Fi networks, as these networks are known to be sensitive to sniffing attempts. Another effective method is to employ Secure Sockets Layer (SSL) or Transport Layer Security (TLS) encryption. SSL and TLS are cryptographic protocols that encrypt network traffic, making it difficult for anyone to intercept the data. Many websites use SSL or TLS encryption by default, however, browser plugins such as HTTPS Everywhere can be used to impose SSL/TLS encryption on websites that do not support it. SSH tunneling is another method for encrypting network traffic. SSH is a secure network technology that allows users to securely connect to remote servers. SSH tunneling allows
3 network communication to be routed through a secure tunnel, making it difficult for anyone to intercept the data. Finally, packet filtering can be employed to prevent sniffing efforts. Packet filtering is the process of examining incoming and outgoing network traffic and permitting or rejecting specific packets depending on established rules. Sniffing attempts and illegal network access can be blocked by utilizing packet filtering. How is updating the operating system of Linux different from updating Windows? Updating the Linux operating system differs from updating Windows in various ways. The technique of delivering and installing updates is one of the most significant distinctions. In Linux, updates are typically given via a package manager, which is a utility that controls the installation and removal of software packages. The most widely used package managers in Linux are APT (Advanced Package Tool) and YUM (Yellowdog Updater, Modified). To upgrade a Linux operating system, use the package manager and search for available updates. Once the updates have been discovered, they may be selected and installed using the package manager. In some cases, a command in the terminal may be required to update the system.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help