Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Find any security-related software/tool and write a 1-2 pages critique about the

ID: 3903131 • Letter: F

Question

Find any security-related software/tool and write a 1-2 pages critique about the software. This can be anti-malware, network analyzer, encryption application, etc. Examine the software carefully and write a report that covers the following:

An overview of the software and its goals. Take a screenshot of the main interface.

Description of the steps required to accomplish the task(s) by the user

What are the good and the bad things with the software, along with your recommendations for improvements?

Explanation / Answer

Security related software tool:

  Today in modern environment where each and every field got adopted to computer and software structure. So it is necessary for any environment to have some security features to protect the data used in the environment. Each security tools has its own way of protection and its pros and cons. Here we are going to discuss about the tool "Wireshark"

Overview of Wireshark and Goal:

It was free and open source packet analyzer which gives the detail about packet that was transferring across the network. With the detailed information about the packet we can confirm the security necessary for data that we are trying to send it end to end. The main goal of the tool is to have a detailed analysis about the data transfer and ensure the security features necessary.

Description of the steps from user end:

1. One has to download and install the software in the system that was connected in the network.

2. once after we hit with some issue in the network, we need to run the wire shark tool.

3. Wireshark will get through all the phase in data transaction and will give a detailed log about the data transmission.

4. Also it supports finding the cause and analysis for the all the cases in data transmission, which helps to ensure the security feature.

Pros and Cons:

It was the widely used tool to capture the data across the packet and will analyze it. It has its own pros and cons, that was discussed below

Pros :

1. Free software, available both in Unix and Windows.

2. Able to see detailed information about the packets that are captured.

Cons:

1. Poor notification about the unwanted entry to the network.

2. Only able to capture the information, can't able to send it implicitly.

Recommendations :

~ Adding the ability to send the data log explicitly.

~ Shoul provide proper error message for different causes

  

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote