153
.pdf
keyboard_arrow_up
School
Per Scholas Inc *
*We aren’t endorsed by this school
Course
A
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
4
Uploaded by ElderDangerElephant36
Abraham McClain, Mike Scruggs, Justin Hairston
Packet Tracer – Exploring File and Data Encryption
1
Addressing Table
Device
Private IP
Address
Public IP
Address
Subnet Mask
Site
FTP/Web Server
10.44.1.254
209.165.201.3
255.255.255.0
Metropolis Bank HQ
Mary
10.44.3.101
N/A
255.255.255.0
Healthcare at Home
Bob
10.44.1.3
N/A
255.255.255.0
Metropolis Bank HQ
2
Objectives
Part 1: Locate the FTP Account Credentials for Mary’s Laptop
Part 2: Upload Confidential Data using FTP
Part 3: Locate the FTP Account Credentials for Bob’s PC
Part 4: Download Confidential Data using FTP
Part 5: Decrypt the Contents of the clientinfo.txt File
3
Background
In this activity, you will access the encrypted contents of multiple files and transfer a file across the Internet to a centralized FTP server. Another user will then download the file from the FTP server and decrypt the files’ contents. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to transfer a file with encrypted data to another device.
Part 1:
Locate the FTP Account Credentials for Mary’s Laptop
Step 1.1:
Access the text document on Mary’s laptop.
a.
Click the Healthcare at Home site and then click the laptop Mary
.
b.
Click the Desktop
tab and then click Text Editor
.
c.
In the Text Editor window, click File
> Open
.
d.
Click the document ftplogin.txt
and click OK
.
Step 1.2:
Decrypt Mary’s FTP account information.
a.
Highlight all the text from the ftplogin.txt
file and copy it.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1
of 4
Packet Tracer – Exploring File and Data Encryption
b.
Open a web browser on your personal computer and browse to the website https://encipher.it
c.
Click the whitespace on the right of the website and paste in the encrypted text
.
Click the Decipher It
button and use the decryption password maryftp123
to decrypt the encrypted text. Click Decrypt
.
What is the username and password for Mary’s FTP account?
Username= mary
Password= cisco321__
______________________________
Part 2:
Upload Confidential Data using FTP
Step 1.1:
View the confidential document on Mary’s Laptop.
a.
Click the Healthcare at Home site and then click the Laptop Mary
.
b.
Click the Desktop
tab and then click Text Editor
.
c.
In the Text Editor window, click File
> Open
.
d.
Click on the document clientinfo
.txt and click OK
.
What form is the data in?
_
___________________________________It is encrypted ________________________________________________
Step 1.2:
Remotely connect to the FTP server.
a.
Within the Healthcare at Home site, click the Laptop Mary
.
b.
Click the Desktop
tab and then click Command Prompt
.
c.
Connect to the FTP/Web
server at Metropolis Bank HQ by entering ftp 209.165.201.3 in the command prompt.
d.
Enter the username/password credentials located in Part 1 Step 2
Step 1.3:
Upload a file to the FTP server.
a.
At the ftp>
prompt, enter the command dir
to view the current files stored on the remote FTP server.
b.
Mary has a file containing encrypted healthcare client information. Upload the clientinfo.txt
file to the FTP server by entering the command put clientinfo.txt
.
c.
At the ftp>
prompt, enter the command dir
and verify the clientinfo.txt
file is now on the FTP server.
If cyber criminals were to capture the file transfer crossing the Internet, what would be in clear text?
________
__________________________________________The information in the document and the username/password
__________________________________
Part 3:
Locate the FTP Account Credentials for Bob’s PC
Step 1.1:
Access the text document on Bob’s PC.
a.
Click the Metropolis Bank HQ site and then click the PC Bob
.
b.
Click the Desktop
tab and then click Text Editor
.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 2
of 4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help