Reference no: EM132292176
Demonstration of network security toolsPurpose of the assessment
The purpose of this assignment is to evaluate and compare two security tools. Student will discuss common threats and attacks on networked information systems, and how to mitigate them. Students should be able to demonstrate their achievements in the following unit
learning outcomes:
b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems;
Assignment Description
For this assignment, you will evaluate two network security tools. Marks will be awarded based on the sophistication and the difficulties the demonstration explored.
Your task is to complete and make a 7-8 min video presentation on the following:
1. Download and install (on your computer or on MIT Virtual box) any two of the security tools from Table 1.
2. Outline of your presentation should include description of the tools.
3. Demonstrate (narration of your actions recorded by video) 4 tasks that each of the software/security tools can perform. Your demonstration should include:
i. Discussion on the threats that these tools could be used for mitigating (name and brief description of the threats should be included in your discussion), and
ii. Explanation of how to use these tool to monitor security threats.
4. Comparison of the tools that you used in this work. Your comparison could include:
i. Security features (range/level)
ii. Time is taken to detect any threat
iii. Ease of usage
5. Analyse the following scenarios and give your opinion on which of the tools that you investigated could be more suitable for these scenarios. In your analysis, please consider the following:
i. Discuss the business requirement for JKL in terms of security.
ii. What is the probable security threat for JKL?
iii. Propose a better suited tool (between the two tools that you have worked on).
6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the security tool.
Case Scenario: JKL is a small software development company with two sites in Brisbane and Adelaide. The head office of JKL is in Adelaide. The servers are located in Adelaide. Each office has approximately 50 staff and they have 5 departments, Technology, Finance, Operations, Customer service and Administration. Staff from both sites need to communicate with each other on a daily basis on various office matter. Development work is done in collaboration with staff from both sites. Some of the clients of JKL require highest level of security and confidentiality of their data and information. So, network and information security is very important for JKL. The challenge of JKL is to maintain high level of security within a small budget.
Length of Video: Introduction (30 secs approximately, your appearance should be in the video) + Outline of the presentation (30 secs approximately) + Demonstration of the task (260 seconds approximately) + Comparison of the Tools (30 seconds approximately) +Analysis of the scenario (40 secs approximately) + Conclusion (30 secs approximately, with appearance). The total length of the presentation should not more than 8 minutes (mark would be deducted for over-length presentation).
Table 1: Network Security Tools (You can choose any two network security tools for your demonstration with your tutor's consent)
Serial #
|
Name of the security tool
|
1
|
Metasploit Framework
|
2
|
Nessus
|
3
|
Snort
|
4
|
Hydra
|
You may use any of the available open source software for screen capture. Please find the following as an example.
• Software:
The following resources may be of use:
• Textbooks
• Youtube Videos