Analyse cyber security threats and attacks

Assignment Help Computer Networking
Reference no: EM132292072

Penetration Testing Project for eCommerce Website

Learning Outcome

The purpose of the assignment is to analyse the botnet attacks in cybersecurity; evaluate available defensive resolutions, and recommend a security solution. Students will be able to complete the following ULOs:
a. Analyse cyber security threats and attacks
b. Implement and evaluate security testing tools in a realistic computing environment

Assignment 1: Penetration testing on eCommerce Website

Assignment Description

You are a new IT engineer at PureHacking.com located in Australia.

Your client is Mr. Daniel Gromer who runs a chain of clothing shops in Australia. Mr Gromer runs over 50 clothing shops in Sydney and Melbourne targeting female customers in their early twenties with moderate budget. Mr. Gromer has recently taken an interest in online business as he realized that many of his competitions have moved onto the online platforms reducing their expenditure significantly. Mr. Gromer has hired a team of web developers (located overseas) to develop and their new online shop is ready to launch in May 2019. Mr. Gromer has no IT background but he is aware of many cases where the websites were hijacked and lost fortunes alongside ruining their digital reputations.

Mr. Gromer has approached the PureHacking.com to assess his new eCommerce website and report any vulnerabilities ahead of its launch as Mr. Gromer is aware that he may get only one chance at the online success and if the website security is breached, he can face major loss in his investment.

Mr. Gromer informs: his eCommerce website is using WooCommerce plugin implemented on the WordPress website platform and the entire website is running on Linux webserver. The website developers have been using FTP to upload the website contents to the Linux webserver. The developers are fairly certain that their FTP passwords were complex enough not to be compromised. The password is given to PureHacking (your lecturer).

Your task is to write a report on how you will perform penetration testing on the eCommerce platform and Linux-based FTP webserver to identify their security vulnerabilities and breaches.

In this report, you are to report:

1. Potential risks and threats to the eCommerce website and their web server.

2. Penetration testing tools and technologies you will use
a. Description of tools and technologies
b. Other case episode of their usages

3. Expected outcomes from the penetration testing

4. Resources you will require to complete the penetration testing (including security credentials in red teaming).

5. Expected business benefits to the client (Mr. Gromer).

6. Conclusion and remarks on future works.

Attachment:- Lab.rar

Verified Expert

This assignment we are working on case study of e-commerce website of Mr. Daniel .T of penetration would tools help to solving the problem.We are working on the e-commerce website analyse cyber security threats and attacks and Implement and evaluate security testing tools in Kali Linux based .

Reference no: EM132292072

Questions Cloud

Define the term gdp and explain your definition : Define the term GDP and explain your definition. Name two different kinds of transactions in an economy that are not considered part of GDP.
What factors support decision of airbus producing in america : Airbus, a European plane maker, has announced plans to build its first assembly line in the United States in Mobile, Alabama.
How do the courts interpret these provisions : How do the courts interpret these provisions?
Observations and reflections during practicum experience : Learners are to observe and reflect on practice at institution and make journal entries about their observations and reflections during practicum experience.
Analyse cyber security threats and attacks : MN623 Ethical Hacking and Analytics - Implement and evaluate security testing tools in a realistic computing environment - Analyse cyber security threats
Briefly explaining the history of the us national debt : Write an APA 6th ed. formatted paper, 7 pages long about the US national debt. After briefly explaining the history of the US national debt.
What benefits can these social class bring to diversity : What are the three main classifications of social class? What benefits can these social class bring to diversity?
The innovation concept apply to diversity management : How might the innovation concept apply to diversity management?
Weighed against the project ability to satisfy scope : Project success is weighed against the project’s ability to satisfy scope, time and cost requirements.

Reviews

len2292072

4/24/2019 2:18:07 AM

hi this is my assignment i need your help to make it. the first file which is assignment 1 is the main task file and the second file MN623 lab 6 is the file which can help you to understand the main task. All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  How project management fundamentals apply

MN601 - Project Management - Problem/Project Based Learning (PBiL) Project - Reflect upon your experience of managing the project

  Main categories of information assets

Assess the information security situation in a small business eg. a restaurant and make recommendations for improvements.

  Create both a firewall architecture and acls

A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm's public webserver.

  Technical recommendation for addressing the security

Describe your technical recommendation for addressing the security requirements in the overall technical design of the ABC Healthcare network. This should include both internal and external (untrusted and trusted) aspects. Untrusted would include ..

  Describe two important defensive steps or mechanisms

Identify any of the "measures that may be used for intrusion detection" (things/events that IDS look for) AND discuss how monitoring this measure might lead to a "false alarm" by your IDS.

  Considering changing cell phone plan

considering changing her cell phone plan

  The wireless lan technology had a profound impact

The wireless LAN technology (IEEE802.11x standards) has had a profound impact in short-range communications. Other wireless technologies, particularly Bluetooth, Zigbee, IrDA, RFID and NFC offer shorter-range communication services for various typ..

  Current network environment and services

You were hired as the manager for network services at a medium-sized firm. This firm has 3 offices in 3 American cities. Recently, the firm upgraded its network environment to an infrastructure that supports converged solutions

  About wireless networks

Wireless networks

  Discuss the need for open systems communication

There are standards in network communication through which data is transferred from one system to another.

  Calculate number of ccs that is equivalent to two erlangs

Calculate the number of CCS that is equivalent to 2 Erlangs. What is the name of the gateway interface/port that faces an analog phone?

  Design of secure enterprise wireless network

Apply and evaluate wireless network security techniques in consideration of ethical implications - Design and implement secure enterprise wireless networks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd