Critically analyse and evaluate security techniques

Assignment Help Other Subject
Reference no: EM132919574 , Length: word count:1500

7COM1068 Cyber Operations - University of Hertfordshire

Learning Outcome 1: Critically analyse and evaluate security techniques used to protect complex heterogeneous environments and apply their findings for offering advice regarding solutions to decision makers.

Learning Outcome 2: Apply advanced and current concepts/issues of computer systems risks, vulnerabilities, threats analysis, and software security in the context of a penetration test

Learning Outcome 3: Use initiative for autonomously conducting and managing a penetration test, within a complex and unpredictable environment, demonstrating a systematic approach of creatively applying knowledge in unfamiliar contexts for solving problems

Assignment Brief:

Instructions:
This submission link is for submitting the 2nd REF/DEF assignment only. You are only required to undertake this assignment if you have an FREFC or a DEFC for Assignment 2 and you have passed Assignment 1.

Scenario:
Assume that you are working as a consultant for an SME which is building its capability in penetration testing. Your client has asked your employer to conduct the penetration test against a server, as they fear they might have already been breached. To their best of their knowledge, the company assumes that the server offers only the following online services: http, b) ssh, and c) vnc.

This is an individual assignment that will assess your ability to conduct a full-scale penetration test. Please ensure that in completing these tasks you deploy the techniques you have been taught in your course and, especially, in this module. If you produce work that is not concise and to the point, then marks may be reduced. The deadline for this assignment is the 24.06.2021.

Task 3

You are expected to undertake a grey-box Penetration Test. To guide your activities, you are expected to use the plans that you have produced in Assignment 1.

Information about the IP address of target of your test as well as the schedule to access it is available on Canvas. Specifically, please navigate to the module on Canvas and select the "Your Assignment IP address and your Access Schedule" page, which is available under the "Module Information" Unit, in order to find more information.

Please look at the Assessment Criteria table, which is provided below, for understanding the expected structure of your report. You are required to present your findings in a factual manner to convince decision makers of a large corporation on business strategies. Do not provide a narrative of your intelligence gathering activities in the main report. You may include this in an appendix.

In the Attack Narrative section, you are expected to discuss the attacks you have undertaken and what vulnerabilities you have tested in each attack. In the Vulnerability Details & Mitigation section you are expected to provide a technical explanation of the vulnerabilities you have tested and confirmed (e.g., with a working exploit), as well as offer advice on how to mitigate it. To get full marks for this section you are expected to provide confirmed details and mitigation for three (3) vulnerabilities from the total vulnerabilities that you have found on the target.

Note: In the penetration testing server assignment. Please use this Target IP address : 192.168.1.129

Attachment:- Pentesting Server.rar

Reference no: EM132919574

Questions Cloud

How much is the ending inventory of the branch per books : A Makati home office transfers inventory to its Pasig branch at 140% of cost. How much is the ending inventory of the branch per books
Write a php script to decode a json string : Write a PHP script to decode a JSON string and Write a PHP script to decode large integers - Write a PHP script to get JSON representation of a value
Designing and developing a cyber defence environment : Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access
Calculate the deferred tax asset or deferred tax liability : Assuming the applicable federal tax rate is 21%, calculate the deferred tax asset or deferred tax liability balance as of the last day of the calendar year 2021
Critically analyse and evaluate security techniques : Critically analyse and evaluate security techniques used to protect complex heterogeneous environments and apply their findings for offering advice regarding
Define organizational structure and controls : 1. Define organizational structure and controls and discuss the difference between strategic and financial controls.
Enforce the stipulation between cathy and ana : Ana owes Cathy P80,000.00. Both are house painters. It was agreed that Ana instead of paying Cathy, will paint the house of Remie to which Remie expressed her c
Determine the optimal strategy for the organization : Pick any organization you are familiar with and perform a PEST analysis. How would your answer change if there were (1) a sudden advancement in technology, (2)
Should organisations and managers provide clear career paths : Should organisations and managers provide clear career paths to their employees, or employees should act more proactively to develop their own career ladders

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd