Article Writing Homework Help
· · Lab – Phishing Trace Attached Files: o Week 5 – trace IP Physical Location.rtf (38.189 KB) Lab WK 5 Scenario: You are the cybersecurity expert for a government organization. There is great c
·
· Lab – Phishing Trace
Attached Files:
o Week 5 – trace IP Physical Location.rtf (38.189 KB)
Lab WK 5
Scenario:
You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.
2. You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email
3. From own email view the source code (Google it – Depending on your system or browser)
4. Search the source code (Control+F) enter Sender
5. Use one of the links below to physically locate the IP
· Trace the IP
· What’s My IP (https://whatismyipaddress.com)
In a word document:
· Copy the source code and paste it “highlight the senders IP”
· Take a screenshot of the actual location on the IP : You may not get a house address but the city with latitude and longitude will be shown.
Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.
Mac
Outlook (Windows)
Web Browser Google or Gmail
·
Extra Credit Lat and Long
5 Points Extra Credit
Instructions for Google Maps
From the previous exercise enter the Latitude and Longitude in Google Maps
Example: 37° 45′ 3.60″ N, 97° 49′ 19.20″ W
CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, isfor the sole use of the intended recipient(s) and may contain confidentialand privileged information or may otherwise be protected by law. Anyunauthorized review, use, disclosure or distribution is prohibited. If youare not the intended recipient, please contact the sender by reply e-mailand destroy all copies of the original message and any attachment thereto.