Review the steps found in business process engineering. Review the lesson presentation and assigned readings. Post the step you think could be altered and explain why. Respond to the following and, if appropriate, include personal experiences as part of your answer: • Briefly summarize the steps in business process engineering. • Identify one step that you think can be altered and describe how you would change it. • Explain your reasoning for the altering this step and how it would affect the end result of the business process. (Optional) Use the Internet to research the airline industry. Select an airline company. Be sure to identify where its major activities fall within Porter's generic value chain. Post at least two activities (processes) of the airline under the correct value chain activity below and justify why it belongs in that activity. • Inbound Logistics (Primary Activity) • Operations/Manufacturing (Primary Activity) • Outbound Logistics (Primary Activity) • Sales & Marketing (Primary Activity) • Customer Service (Primary Activity) • Procurement (Support Activity) • Technology (Support Activity) • Human Resources (Support Activity) • Accounting & Finance (Support Activity) Network Security Due date: Week 6, 14th April ASSESSMENT Weighting: 80% 1 Length: N/A Question 1 (5 marks) Note: for this question, you need to download a PCAP file located in the course Moodle web site. Peter is the Network Security Manager for a small spare parts business. The organisation uses an e-sales application to provide a front-end for its e-sales business. Customers are complaining that in the last two or three days the system has become very slow, taking them longer than normal to place their orders. This information has been corroborated by staff complaining that they are not happy with the slow response of the system to complete their daily activities. Peter suspects that the system has been the target of criminal hands and before he starts responding to the attack, he decides to investigate the issue a little further. First, he reviews the firewall logs and notices something abnormal in the type of traffic directed to a number of internal hosts including the organisation’s web server. Curious about this traffic, Peter uses Wireshark to capture a trace of the traffic. [A section of this trace can be accessed from the course Moodle web site]. Based on the above fictional scenario and the provided PCAP: (a) Identify the anomaly in the traffic this organisation is going through (1/2 Mark). What sort of evidence do you have to make this claim? (1. 0 Marks). (b) What sort of utility or tool do you think the “attacker” is using to conduct this attack? (1/2 mark) (c) Provide the IP address of the host used by the perpetrator (1/2 Mark). Based on this information, what can you tell about the profile of this individual? Explain why (1.5 Marks). (d) What Wireshark filter do you think Peter used to produce the given PCAP? Explain why (1 Mar ...