Describe approaches to computer security

Assignment Help Computer Network Security
Reference no: EM132218495

Assessment Task - Problem Solving Task

Objectives of the assessment

The learning objectives of this assessment task are to:

ULO1 Describe approaches to computer security including access control, identity verification and authentication in order to minimize the cyber attacks on a system.
ULO4 Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks and malicious software that exists.

Cybersecurity Scenario

Welcome to Deakin Wargames, an interactive assessment of your knowledge and understanding of vulnerabilities relating to computer security, internet security and privacy.

This challenge requires you to work through ten levels, each of which contains a vulnerability. In order to progress to the next level, you must exploit this vulnerability to obtain a password which will grant you access to the next level.

Marks are allocated based on your ability to progress through each level as well as your understanding of the vulnerability and the recommendations you make on how to fix the issue. That is, you are expected to fully understand how you completed each level; this will be assessed through the problem solving task report.

Problem solving task report

Each student is to submit a report of approximately 2000 words and exhibits following the rubric provided. The report MUST include descriptions and evidence of results of the steps performed in order to be eligible to be awarded maximum marks for each rubric criterion.

You will note that the weighting is higher for levels 0-3 to enable everyone to pass. The levels then get more complex enabling you to decide what grade you want to achieve.

You are required to identify vulnerabilities and perform associated attacks to ultimately gain access to level 10 of the website. There are 5 vulnerabilities listed below covered by the 10 levels.

The name of the vulnerability that corresponds to each level is provided for you!

• Information Leakage
• Directory Traversal
• Weak Encryption
• Cookie Manipulation
• SQL Injection

The attached table provides guidelines on the information to be included for each vulnerability.

There needs to be 1 table completed per level.

Attachment:- Assessment_Task.rar

Reference no: EM132218495

Questions Cloud

Create a linear regression model in spss : Your goal is to create a regression model that can predict income based on age in years. Create a linear regression model in SPSS.
Develop a vision document for this project : Your task is to develop a Vision Document for this project. You are to describe the problem in your own words, and the capabilities and benefits.
In how many ways we can do synchronization in java : When a thread is executing a synchronized method , then is it possible for the same thread to access other synchronized methods of an object ?
Display the total monthly cost of these expenses : Display the total monthly cost of these expenses and the total annual cost of these expenses.
Describe approaches to computer security : SIT182- Real World Practices for Cybersecurity - Describe approaches to computer security including access control, identity verification and authentication
Ask the user to enter five floating point numbers : Write a program that asks the user to enter five floating point numbers, echo each to the screen, and then display the first number to 1 decimal place.
Discuss the accounting principles : Critically discuss the accounting principles and qualitative characteristics of useful financial information that were violated in the above case.
What is the company breakeven point in units : The Pramedia Company has three product lines of books- A, B, and C- with contribution margino $10, S8, and $4, respectively. The president foresees sales.
Advise jill regarding the income tax consequences : Advise Jill regarding the income tax consequences of the above transactions for her, in relation to the 2017/18 income year. In your answer, make sure.

Reviews

len2218495

1/18/2019 4:11:35 AM

• NO work is saved or backed up on the Website – Make sure you keep a record of your steps and findings! • Ensure you take screenshots of your work for evidence and that these are legible in your report. • To complete this assessment you will need to do research, read the information provided on the Website and covered the theory and practical material for weeks 5-9. • Your submission must be in a form readable by Microsoft Word.

len2218495

1/18/2019 4:11:23 AM

• NO EXTENSIONS allowed without medical or other certification. • LATE ASSIGNMENTS will automatically lose 5% per day up to a maximum of five days, including weekends and holidays. Assignments submitted 6 or more days late will not be marked and are given zero.

len2218495

1/18/2019 4:10:55 AM

This solution for this assessment cannot be directly found using a ‘Google’ search. You must understand this is a challenge and need to apply your knowledge and problem-solving skills to a series of cyber security concepts. Also, make sure you don’t share your progress or solutions with others. A guide has been provided as part of the resources for this assessment. It is important to understand that the assessment has been designed for everyone to pass. To achieve a higher grade is going to require a concerted effort by you.

Write a Review

Computer Network Security Questions & Answers

  Common information security concepts at the apprentice level

Write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit

  Is data hiding a valuable security consideration

Explain the term data hiding, which is used in object-oriented programming. Is data hiding a valuable security consideration. Why or why not

  Importance of explicit enterprise security policies

What is the importance of explicit enterprise security policies and procedures

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

  Information about the cases

Most of the questions are based on actual cases, so information about the cases can be googled if wanted. (Example Search Term: Dodona I, LLC vs. Goldman Sachs & Co.)

  Do you foresee a fusion between lan and wan

Do you foresee a fusion between LAN, MAN, and WAN technologies in the future?

  Analyze the approach taken by the attackers to gain access

Analyze the failures in the security principles that made the organization vulnerable to this attack.

  How you could determine the feasibility of the solution

Population: Native American Indian public health problem: cancer and diabetes. An explanation of how you could determine the feasibility of this solution

  Discussion on computer crime

The state crime lab training coordinator is concerned with level of expertise at its Blacksburg, VA location and would like to contract DC Investigative to conduct four training sessions.

  Peer entity authentication security service

Draw a matrix similar to the table presented in class that shows the relationship between security services and attacks - Peer entity authentication security service

  Discuss tools and techniques for removing malware

Discuss tools and techniques for removing Malware using the text Internet, and/or your job as reference for full credit. Discuss best practices for Microsoft Windows Group Policy using the text Internet and/or your job as reference for full credit.

  Define principles of risk management that apply to industry

Define the principles of risk management that apply to the retail industry. Define steps for a retail loss-prevention program. Explain the security systems you incorporated in your loss prevention analysis.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd