Article Writing Homework Help

·    ·  Lab – Phishing Trace Attached Files: o   Week 5 – trace IP Physical Location.rtf (38.189 KB) Lab WK 5 Scenario: You are the cybersecurity expert for a government organization. There is great c

·   

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

·  Lab – Phishing Trace

Attached Files:

o   Week 5 – trace IP Physical Location.rtf (38.189 KB)

Lab WK 5

Scenario:

You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.

2.  You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email 

3.  From own email view the source code (Google it – Depending on your system or browser)

4.  Search the source code (Control+F) enter Sender

5.  Use one of the links below to physically locate the IP

·  Trace the IP 

·  What’s My IP (https://whatismyipaddress.com)

In a word document:

·  Copy the source code and paste it “highlight the senders IP”

·  Take a screenshot of the actual location on the IP : You may not get a house address but the city with latitude and longitude will be shown.

Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.

Mac

Outlook (Windows)

Web Browser Google or Gmail

·  

Extra Credit Lat and Long

5 Points Extra Credit

Instructions for Google Maps

From the previous exercise enter the Latitude and Longitude in Google Maps

Example: 37° 45′ 3.60″ N, 97° 49′ 19.20″ W

CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, isfor the sole use of the intended recipient(s) and may contain confidentialand privileged information or may otherwise be protected by law. Anyunauthorized review, use, disclosure or distribution is prohibited. If youare not the intended recipient, please contact the sender by reply e-mailand destroy all copies of the original message and any attachment thereto.