Phishing trace | threats and counter measures

Category: Engineering

 

Scenario:

You are the cyber security expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in order to provide law enforcement with as much information as possible you decide to track the sender.

  1. You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email 
  2. Trace the IP to get a physical address (starting point)
  3. Share any other information you find that may be relevant to law enforcement

 https://www.ip-tracker.org/Trace the IP 

 

Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.

Mac https://www.lifewire.com/view-message-source-os-x-mail-1172799 

Outlook (Windows) https://www.extendoffice.com/documents/outlook/1794-outlook-view-email-source-code.html 

Week 5 – trace IP Physical Location.rtf 

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Pay Someone To Write Essay