Critically analyse and evaluate risk analysis

Assignment Help Computer Network Security
Reference no: EM132944161

CT6034 Advanced Networking and Security - University of Gloucestershire

Learning Outcome 1: Critically analyse and evaluate risk analysis and management strategies to address the associated risks, threats, vulnerabilities and attack vectors against network architectures to secure the operational and service delivery requirements;

Learning Outcome 2: Critically evaluate the organisational security requirements for a network security solution against known regulations, standards, legislation, policies and procedures to develop a systematic solution to the network and organisational security requirements;

Learning Outcome 3: Demonstrate the ability to understand and synthesize the principles of network security architectures and security frameworks and models;

Learning Outcome 4: Critically analyse and evaluate network security controls and mitigation techniques: network monitoring, firewalls and traffic filtering, intrusion detection and prevention systems, intrusion analysis, anti-malware, cryptography, securing network protocols, services, applications and data to mitigate the identified risks of the evaluated system;

Learning Outcome 5: Analyse a number of advanced networking topics and future networking direction;

Learning Outcome 6: Critically evaluate and communicate network security alternatives arguments, assumptions, abstract concepts and data to make judgments, and to frame appropriate questions to achieve a solution - or identify a range of solutions - to a given problem, to both technical and non- technical stakeholders.

Assessment 1

Research on the state-of- the-art Ad hoc network routing or security algorithms. You need to choose a protocol with the advice of the tutor of the module and work on that. In this document, you must include discussing how you designed your simulation and explain the results in relation to the study and research you did on the protocols.

Implementation: NetLogo simulation of the researched area. You need to make sure that you use three elements of coding, UI and BehaviorSpace in the work.

1) You need to select a dataset (or more) of PCAPS with the confirmation of the module tutor for your assignment and analysis. You may use following resources, but you are free to choose from other sources as well.

2) Provide a schematic of how the attack has happened looking at different layers. Investigate what were the vulnerabilities which led to a successful attack. You need to provide evidences for your claims from the datasets and also you can refer to literature to support your findings.

3) Make sure you include your methodology of investigation with justification of why you use these methods. Explain the rationale behind your choices of methods to analyse the dataset.

4) Finally, provide discussion about your results and findings. You need to show you understand how the attack happened and what could be done to prevent / mitigate the attack.

Your assignment should follow this structure (3000 words):

A) Introduction (a short literature review on the related topics and attacks, the selected dataset and selected methodology of investigation)

B) Analysis (the actual process of analysis and numerical results, all the steps which have been done in the process of analysing the dataset)

C) Discussion (the explanation of the results, how to address those vulnerabilities, or how the attack could be enhanced or be more efficient)

D) Conclusion

E) Bibliography

F) Appendices (if you use any code, you need to include it here, also screenshots of the tools that you used during analysis)

Attachment:- Advanced Networking and Security.rar

Reference no: EM132944161

Questions Cloud

What the accumulated depreciation at the date of sale : Leone Dairy sold a delivery truck for cash of $6,200. The original cost of the truck, What the accumulated depreciation at the date of sale must have been
What is the COGS under the average cost method : At the end of the month, 100 units are left unsold. What is the COGS under the average cost method? Choose the best answer closest to your calculations
How many payments will take to settle the loan : How many payments will it take to settle the loan? Longcore Technologies has to settle a business loan of $60,000, which has an interest rate of 13% compounded.
Explain what use of the term sale : Explain what use of the term sale rather than demand presume
Critically analyse and evaluate risk analysis : Critically analyse and evaluate risk analysis and management strategies to address the associated risks, threats, vulnerabilities
What dollar sales volume is currently required to obtain : In the absence of income taxes, at what sales volume will both alternatives (automation and out- sourcing) provide the same profit?
What is the net present value of the project : Suppose Stephenson decides to issue equity to finance the purchase. What is the net present value of the project
How much must be contributed at the end of each month : An RESP account earns 4.16% compounded daily. How much must be contributed at the end of each month in order to accumulate $270,000 in 16 years?
What is the estimated cost of merchandise inventory : If the estimated rate of gross profit is 40%, what is the estimated cost of merchandise inventory on June 30, based on the following data?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Information and communication technology infrastructure

In this Group Project, assume that you and the members of your group are top managers of a big international company spread over several continents. You decide to rebuild/expand your company's Information and Communication Technology infrastructur..

  What is the mutual information of the source and receiver

A source X sends 0's and 1's with probabilities π and 1-π, respectively, to a receiver Y. - What is the mutual information of the source and receiver?

  Challenges and emerging trends

Insights on best practices, challenges and emerging trends. It will be a power point presantation.

  Explain the three general sources of security threats and

explain the three general sources of security threats and five types of security losses. your response should be at

  Write two command-line sockets programs

Write two command-line sockets programs – a client and a server – as follows. Define a Who-Am-I message as a UDP datagram containing the ASCII string “WHO AM I”

  Write a reseach paper on host intrusion detection systems

Write a reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems. Computer Virus creates major headaches for most organizations, as this list of 10 worst PC virus outbreaks shows.

  Privacy and security of information

Privacy and security of information- Pat, a billing associate at a local hospital, was issued a laptop for work purposes. Her friend, however, has asked to borrow it for school to complete an online assignment

  Develop a subset of a security plan for the network

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and develop

  Write a paper on operations security

Write 250 words on operations security and 250 words on cryptography related to work experience. How do we use them in our work environment.

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  Describe an important principle in information security

An important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense in depth.

  Describe the company network and interconnection environment

Describe the company network, interconnection, and communication environment. Assess risk based on the GFI, Inc. network diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd