Demonstration of network security tools

Assignment Help Computer Networking
Reference no: EM132292176

Demonstration of network security toolsPurpose of the assessment

The purpose of this assignment is to evaluate and compare two security tools. Student will discuss common threats and attacks on networked information systems, and how to mitigate them. Students should be able to demonstrate their achievements in the following unit

learning outcomes:

b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems;

Assignment Description

For this assignment, you will evaluate two network security tools. Marks will be awarded based on the sophistication and the difficulties the demonstration explored.

Your task is to complete and make a 7-8 min video presentation on the following:

1. Download and install (on your computer or on MIT Virtual box) any two of the security tools from Table 1.

2. Outline of your presentation should include description of the tools.

3. Demonstrate (narration of your actions recorded by video) 4 tasks that each of the software/security tools can perform. Your demonstration should include:
i. Discussion on the threats that these tools could be used for mitigating (name and brief description of the threats should be included in your discussion), and

ii. Explanation of how to use these tool to monitor security threats.

4. Comparison of the tools that you used in this work. Your comparison could include:

i. Security features (range/level)
ii. Time is taken to detect any threat
iii. Ease of usage

5. Analyse the following scenarios and give your opinion on which of the tools that you investigated could be more suitable for these scenarios. In your analysis, please consider the following:

i. Discuss the business requirement for JKL in terms of security.
ii. What is the probable security threat for JKL?
iii. Propose a better suited tool (between the two tools that you have worked on).

6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the security tool.

Case Scenario: JKL is a small software development company with two sites in Brisbane and Adelaide. The head office of JKL is in Adelaide. The servers are located in Adelaide. Each office has approximately 50 staff and they have 5 departments, Technology, Finance, Operations, Customer service and Administration. Staff from both sites need to communicate with each other on a daily basis on various office matter. Development work is done in collaboration with staff from both sites. Some of the clients of JKL require highest level of security and confidentiality of their data and information. So, network and information security is very important for JKL. The challenge of JKL is to maintain high level of security within a small budget.

Length of Video: Introduction (30 secs approximately, your appearance should be in the video) + Outline of the presentation (30 secs approximately) + Demonstration of the task (260 seconds approximately) + Comparison of the Tools (30 seconds approximately) +Analysis of the scenario (40 secs approximately) + Conclusion (30 secs approximately, with appearance). The total length of the presentation should not more than 8 minutes (mark would be deducted for over-length presentation).

Table 1: Network Security Tools (You can choose any two network security tools for your demonstration with your tutor's consent)

Serial #

Name of the security tool

1

Metasploit Framework

2

Nessus

3

Snort

4

Hydra

You may use any of the available open source software for screen capture. Please find the following as an example.
• Software:

The following resources may be of use:
• Textbooks
• Youtube Videos

Reference no: EM132292176

Questions Cloud

Discussion about the climate change skepticism : Descartes offers an example of productive philosophical skepticism. What does that example suggest when it comes to current skepticism about the reality.
Write a algorithm to settle the question : Write a algorithm to settle the following question: A bank account starts out with $10,000. Interest is compounded monthly at 6 percent per year
Note that the input validation loop must be used : If the entered score is not valid, repeatedly issue warnings to the user and ask the user to re-enter until a valid score is entered.
Intermediate storage strategy always involves cross-docking : Intermediate storage strategy always involves a cross-docking warehouse that distributes goods to destination markets.
Demonstration of network security tools : MN502 - Overview of Network Security - Melbourne Institute of technology - Demonstration of network security tools - Discuss the business requirement for JKL in
How do the cultural concerns and influences affect justice : How do the cultural concerns and influences affect justice and security administration and practice? What contemporary methods are used in societies of mixed.
What is the total cost at the breakeven point : What is the cost savings from making the correct decision? What is the total cost at the breakeven point? What is the breakeven quantity?
Indicating addition or subtraction from the account : Transactions which do not provide the correct PIN code or attempt to put the account below zero should be ignored.
How diversity of personnel in law enforcement agencies work : How can diversity of personnel in law enforcement agencies work to strengthen agencies and help them achieve their justice and security missions?

Reviews

len2292176

4/24/2019 3:11:58 AM

Grade Mark HD 16-20 DI 14-15 Excellent Very Good Introduction Appearance is Appearance is clear and easy to follow. /2 clear, easy to follow, well prepared and professional Outline Create a very A bullet point /1 nice bullet point outline is provided outline and well and presented presented it before the start of before the the presentation demonstration started Demonstrati on /8 Very profession- al, clear and easy to follow. Professional, clear and easy to follow

len2292176

4/24/2019 3:11:51 AM

Section to be included in the report Description of the section Marks Introduction Student should introduce with his/her physical appearance in the video. 2 Outline Outline of the whole presentation including tool description. 1 Demonstration Demonstrate (narration of your actions recorded by video) all steps from the respective project. 8 Comparison Compare the two tools investigated. 3 Analysis Analysis of the scenario. 4 Conclusion With appearance, draw a conclusion on your experience with the Security Software. 2 Total 20

len2292176

4/24/2019 3:11:43 AM

To upload on Youtube, you must create your account on youtube. If you have a google account (gmail), you already have one on youtube. Videos must be of one of the following formats: .MOV, .MPEG4, MP4, .AVI, .WMV, .MPEGPS, .FLV, .3GPP, and .WebM. Once you have an account, to upload your video, click on the 'upload' button located at the top right-hand corner of your youtube.com webpage. To keep your uploaded video unsearchable by people so that random people cannot view your video(s), you have to select the privacy mode from the drop-down menu on the upload screen to be ‘Unlisted’. This way, your video is viewable by only those who have got the URL of your video. Make sure you copy and paste your video URL in the file submitted on MOODLE for your marker to be able to watch and mark it!

len2292176

4/24/2019 3:11:23 AM

No word limit as there is no written report, but the length of the video should be no more than 8 minutes 5 PM, Friday Week 7 • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd