· Attached Files: o (38.189 KB) Lab WK 5 Scenario: You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate

· Attached Files: o (38.189 KB) Lab WK 5 Scenario: You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender. 2.  You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email 3.  From own email view the source code (Google it – Depending on your system or browser) 4.  Search the source code (Control+F) enter 5.  Use one of the links below to physically locate the IP · · ( ) ·  Copy the source code and paste it “highlight the senders IP” ·  Take a screenshot of the actual location on the IP : You may not get a house address but the city with latitude and longitude will be shown. · From the previous exercise enter the Latitude and Longitude in Google Maps Example: 37° 45′ 3.60″ N, 97° 49′ 19.20″ W This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information or may otherwise be protected by law. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, contact the sender by reply e-mail

Do you need us to help you on this or any other assignment?


Make an Order Now