Critically evaluate a range of computer security solutions

Assignment Help Computer Networking
Reference no: EM132531509 , Length: word count:4000

CECT5804 Penetration Testing and Incident Response - De Montfort University

Assignment - Report on Web Application Penetration Testing and Incident Response

Learning outcome 1: Demonstrate the ability to produce Penetration Testing plans.
Learning outcome 2: Apply Penetration Testing techniques to identify vulnerabilities.
Learning outcome 3: Propose an appropriate incident/intrusion response to a computer security incident.
Learning outcome 4: Critically evaluate a range of computer security solutions.

Task

Analyse the given web application (via URL/port 80/port 443) for vulnerabilities, and produce a report summarising your findings.

Objective

Web developers working for a commercial client have implemented a new web application. The company has requested that a penetration testing is carried out against the web-site, and that a report is prepared of the findings, to be returned to the client.

The VM is a samurai machine with the password of samurai. The website that you need to pen test is located at 127.0.0.1/cwk. The scope of your pen test is limited to the website as seen to the outside world, this means that you should not look at the files directly in a terminal.

You will need VM Player (or VM Workstation) to run the Virtual Machine containing the web-application.

You are to plan and execute a penetration testing of this web-application. You will describe the tools and techniques that you used to carry out the test. Your findings will be prepared as a report (Executive Summary) for the web-site owner, followed by a fuller discussion of the tools and techniques that you used.

Please note that the coursework is to assess your abilities in finding vulnerabilities using only port 80 and or port 443, ie via web-page forms or the address box.

Perform the pentest yourself - do not discuss your findings with anyone else. All sections of the report MUST be an individual piece of work.

Section 1 - Penetration Testing Planning Stage

To plan for the penetration testing, you will need to research techniques and tools to carry out the test. You should consider the use of a web application pen testing methodology and discuss this in your plan. When discussing the tools and techniques, you should also consider the likely outcomes and methods of analysis from each.

Section 2 - Penetration Testing Implementation Stage

Your investigation may or may not discover any problems with the web-site. You must ensure that you have thoroughly documented all tools and processes used in your investigations. You are also expected to critically analyse your penetration test in relation to your test plan, highlighting areas of strength and areas where work deviated from the original design.


The executive summary (a maximum of 600 words) should address the OWASP Top 10 vulnerabilities for 2013. The severity of each uncovered vulnerability should be assessed. The writing style of the summary should be suitable for a busy MD or CEO who is non-technical.

Section 3 - Preventative Recommendation Stage

Finally, you need to provide preventative recommendations to react appropriately. You need to discuss different security solutions to address the identified vulnerabilities and critically evaluate these security solutions.

Section 4 - Incident/Intrusion Response Plan
In this stage, you also need to propose the essential preparations before the incidents occur. For example, what processes and procedures you will put in place, how you plan to detect and analyse incidents, how you plan to collect data and evidence, how to build an incident response team, how to perform an initial response, incident handling and analysis, incident reporting, etc.

Attachment:- Penetration Testing and Incident Response.rar

Reference no: EM132531509

Questions Cloud

Estimate the nominal interest rate on a treasury bond : b. What would be the inflation premium on the Treasury bond if investors required a real rate of interest of 2.5 percent?
Determine the total bond interest expense : Question - Straight-Line: Amortization of bond premium and discount. Determine the total bond interest expense to be recognized over the bonds' life
How would you describe or define nursing theory : Reflect on your current understanding of nursing theory. Compose a 1-2 page paper on this reflection (excluding title page and reference page).
How differences might impact your therapeutic approaches : Post an explanation of how legal and ethical considerations for group and family therapy differ from those for individual therapy. Then, explain how these.
Critically evaluate a range of computer security solutions : Critically evaluate a range of computer security solutions and Demonstrate the ability to produce Penetration Testing plans
Describe the connection between ebp and the quadruple aim : Healthcare organizations continually seek to optimize healthcare performance. For years, this approach was a three-pronged one known as the Triple Aim.
Gram-stains bacteria smear : Explain why some cells are pink and others are purple in Gram-stains bacteria smear. Compare and contrast the biosynthesis of the D.N.A virus with R.N.A virus
Present the journal entries that Happy Sales should record : Present the journal entries that Happy Sales should record for these transactions. Assume that Happy uses a perpetual inventory system
What is the difference in tax that would be paid : The LIFO method will result in income before taxes of $16500. What is the difference in tax that would be paid between the two methods

Reviews

Write a Review

Computer Networking Questions & Answers

  Which icmp messages contain part of the ip datagram

Which ICMP messages contain part of the IP datagram? Compare and contrast informational messages in ICMPv6 with informational messages in ICMPv4.

  How can network fail for one of the perceptrons

Show that in the limit as c→∞ the behaviour of this network of sigmoid neurons is exactly the same as the network of perceptrons. How can this fail when w⋅x+b=0 for one of the perceptrons?

  Beneficial in a network environment

Describe DNS and how it can be beneficial in a network environment you support.

  Analyze the new system and determine the design issues

Analyze the new system and determine the design issues with this new system.

  What special function does a cache server perform

How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers more security for the information assets that remain on the trusted network?

  Describe how a proxy server works and what is the benefit

Describe how a proxy server works and what is the benefit of having a proxy server. What are the primary functions of an incident response plan, disaster recovery plan, and business continuity plan. What is the purpose of a business impact analysis

  What is the minimum size of an icmp packet

What is the minimum size of an ICMP packet? What is the maximum size of an ICMP packet? What is the minimum size of an IP packet that carries an ICMP packet?

  Identify and propose the required servers and server roles

MN506 - System Management - Melbourne Institute of Technology - Design, Installation and Configure Enterprise Network Servers

  Question you work the night shift at a software development

question you work the night shift at a software development company and mange six web servers that host the

  Determine whether you prefer a laptop or desktop

From the e-Activity, determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to offer.

  Examine the throughput of a tcp connection

Compare the Weighted Fair Queuing, Priority Queuing, and FIFO schemes in terms of drop rate, delay, and delay variation. What are the advantages and disadvantages of each - examine the throughput of a TCP connection as the flow control window size..

  Explain how an integrity check value used

Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors - How the receiver checks whether the message has been transmitted without error

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd