lab-5
- Scenario:
You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.- You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email
- From own email view the source code (Google it – Depending on your system or browser)
- Search the source code (Control+F) enter Sender
- Use one of the links below to physically locate the IP
- Trace the IP
- What’s My IP (https://whatismyipaddress.com)
- In a word document:
- Copy the source code and paste it “highlight the senders IP”
- Take a screenshot of the actual location on the IP : You may not get a house address but the city with latitude and longitude will be shown
- Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.
Mac
Outlook (Windows)
Web Browser Google or Gmail
- By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"


Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper Now