CO7607 Penetration Testing and Active Defence Assignment

Assignment Help Other Subject
Reference no: EM132865191

CO7607 Penetration Testing and Active Defence - University Of Chester

Learning Objective 1: Demonstrate the use of some complex penetration testing and active defence tools

Learning Objective 2: Discuss the need for and uses of active defence

Learning Objective 3: Critically evaluate and analyse active defence techniques

Assignment Brief

This assessment is to test your general knowledge of active defence and hands-on understanding of relevant offensive countermeasures tools.

1. Offensive Countermeasures (OCM) and Tools

OCM generally helps us to defend ourselves against attackers and in the process, enables us to get a better understanding of who is attacking us and why. The general categories of OCM are Annoyance, Attribution and Attack.

a. Briefly research and explain, in your own words, each of these three OCM categories (Annoyance, Attribution and Attack). Your discussion should include explanation of the category, its goal and how it can be accomplished. You may use examples.

Note: Avoid taking materials verbatim from source. Best practice is to read and understand the source and then write or paraphrase in your own words, adding value with respect to context and then referencing the source.

b. Demonstrate the use of the following three OCM tools:
» Browser Exploitation Framework (BeEF)
» Word Web Bug
» Kippo or Cowrie

For each tool, say which category it belongs to, what it is used for, explain how it can be used in a particular case example scenario and then demonstrate its use. For the demonstration, set up and use any two virtual machines (VMs) in which one plays the role of a target and the other plays the role of the attacker. Configure and execute the tool as required. Use relevant screenshots, from both VMs, to document and explain the exercise.

Your work MUST provide evidence that you have run the tools yourself, as opposed to having taken images from another source. You must change your terminal prompt to include your J number in the host name - for example, root@J12345 and all terminal screenshots must show the command used. You must include an ifconfig screenshot showing your IP address.

2. OCM General
a. As a defence measure, you want to set up a system that automatically blocks some inbound communications - that is, a system that will block incoming traffic to your system/network. The two ways of configuring your system are to automatically block communications based on traffic and/or based on IP address. Which option (block communications based on traffic or based on IP address) would you recommend and why? Give specific examples.

b. Research and discuss the current UK legislation or legal status relating to OCM. You are to consider any or all of the following:
» Find whether there is/are any existing specific legislation
» What you think is the general view on how the law on self-defence in cyberspace should be designed
» What the government is currently doing concerning legislation relating to OCM

You must use proper APA referencing.

Attachment:- Penetration Testing and Active Defence.rar

Reference no: EM132865191

Questions Cloud

Describe the main types of flu vaccines : The vaccine was quadrivalent. Describe what quadrivalent means. Additionally, list and describe the viruses included in this year's vaccine.
Virus Report Ebola Virus : State all the relevant structural information pertaining to it ie. Nucleic acid, capsid and protein receptors, envelope, etc. More detail is better.
Explain how viral transformation of normal cells : explain how viral transformation of normal cells into cancer cells can occur and give at least 2 examples of such viruses and the cancers they cause.
Learned about the tuskegee experiment : What was the experiment about? Describe the study participants in terms of demographics. Describe at least, three ethical problems raised by the study.
CO7607 Penetration Testing and Active Defence Assignment : CO7607 Penetration Testing and Active Defence Assignment Help and Solution, University Of Chester - Assessment Writing Service
7ENT1069 Procurement and Supply Chain Management Assignment : 7ENT1069 Procurement and Supply Chain Management Assignment Help and Solution, University of Hertfordshire - Assessment Writing Service
COIT20261 Network Routing and Switching Assignment : COIT20261 Network Routing and Switching Assignment Help and Solution, Central Queensland University - Assessment Writing Service
COIT20253 Business Intelligence using Big Data Assignment : COIT20253 Business Intelligence using Big Data Assignment Help and Solution, Central Queensland University - Assessment Writing Service
Question-business presentation criteria : Scenario: You are working for a multinational company's (can select any multinational company) Distribution Department and the company entering a new market and

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss how safety breaches contributed to the train crash

Choose one train incident that has occurred as a result of safety breaches and, with supporting evidence, discuss how safety breaches contributed to train crash

  Damage to which brain structure

Damage to which brain structure would most likely result in death? Which nervous system branch allows a ballet dancer to voluntarily move? This theory of emotion states that physiological responses and emotions are experienced simultaneously.

  Create an annotated bibliography for cloud computing papers

Select five papers about Cloud Computing from IEEE Explorer, SpringerLink, Google Scholar, DBLP and/or ScienceDirect. Create an annotated bibliography

  Describe the innovation of filming techniques

The Birth of a Nation (1915) is still seen as a monumental film due to its innovation of filming techniques that are still used today.

  Does the sample size impact bias or confounding

Does the sample size impact bias or confounding? Will a large study have less bias than a small study? Please justify your rationale.

  The various types of economic and psychological motives

Explain to the new investigators in the paper the various types of economic and psychological motives that exist, so they may best plan their interviews.

  The consequences of making a poor selection

What are some important considerations for selecting a hazardous waste transporter? What might be some of the consequences of making a poor selection?

  Explaining gender-identity formation

Gender-schema theory is a way of explaining gender-identity formation, which is closely related to the cognitive developmental approach.

  How your psa poster targets the vulnerable population

How your PSA poster targets the vulnerable population? The burden of the disorder on the health of the population using epidemiological data.

  Explain process for the development of nursing standards

Outline the process for the development of nursing standards of practice for your state, including discussion of the entities.

  Are advertisements aimed at teenagers effective

Are advertisements aimed at teenagers effective? Are advertisements aimed at teenagers ethical?

  Analyzing a fictional character personality

During this module you have examined eight personality theoretical perspective and some of their corresponding theories. Additionally, you have examined.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd