lab-5

  1. Scenario:
    You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.

    1. You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email
    2. From own email view the source code (Google it – Depending on your system or browser)
    3. Search the source code (Control+F) enter Sender
    4. Use one of the links below to physically locate the IP
    • Trace the IP 
    • What’s My IP (https://whatismyipaddress.com)
    • In a word document:
    • Copy the source code and paste it “highlight the senders IP”
      • Take a screenshot of the actual location on the IP : You may not get a house address but the city with latitude and longitude will be shown
      • Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.
        Mac
        Outlook (Windows)
        Web Browser Google or Gmail

        Week 5 – trace IP Physical Location.rtf

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Looking for a Similar Assignment? Our Experts can help. Use the coupon code SAVE30 to get your first order at 30% off!

Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp