Design and undertake substantial investigations

Assignment Help Computer Network Security
Reference no: EM133020403

1. Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access,

2. Develop a deep and systematic understanding and knowledge of current theoretical and methodological approaches to offensive Cyber Operation concepts and philosophies,

3. Critically reflect on the implementation and management of offensive Cyber Operations at all levels,

4. Critically reflect on the implementation and management of defensive Cyber Operations at all levels

5. Apply with flexibility and creativity originality in the application of the different types of cyber operations and their utilisation and deployment based on the scenario at hand,

6. Design and undertake substantial investigations under the context of situational awareness,

7. Demonstrate self-direction and creativity in designing and developing a cyber defence environment

Detailed Instructions

This is an individual assessment comprised of two tasks of equal weighting. Task 1 will assess your understanding of the theoretical aspects of computer security and cyber operations. Task 2 will assess your understanding of advanced principles in computer security from a systems perspective.

You are expected to demonstrate an insight into the implications of the problem introduced in each task by using clear and concise arguments. You will receive formative feedback as part of the module to demonstrate how to be concise in your written work. Please ensure, in completing these tasks you deploy the techniques you have been taught. If you produce work that is not concise and to the point, then marks may be reduced. The reports should be well written (and word-processed), showing good skills in creativity and design. Sentences should be of an appropriate length and the writing style should be brief but informative.
During the teaching weeks you will have the opportunity to submit draft copies of your portfolio activities. The module team will provide general feedback based on your draft copies and advice regarding your progress (if it is deemed necessary). The deadline for the complete Portfolio is the 13.01.2022.
Task 1 - Paradox of warning
Task 1 is a research-based assignment, weighted at 50% of the overall portfolio mark. It should take you approximately 15 hours to complete. It is expected that the report for this task of the portfolio will be in the region of 1000 words. You are required to expand on the title and explain how different cyber operations can support a defensive cyber security strategy that is making use of the paradox of warning. The milestone for the DRAFT Task 1 is on week 16 by electronic submission via Canvas. The module team will then provide general formative feedback, allowing you the opportunity to reflect on your activities and improve your work where necessary. The final revised copy of Task 1 should be included in the final Portfolio. Although there are no allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard
referencing style as per the University regulations.

It is expected you will research and discuss the notions in the above table and synthesise a defensive cyber security strategy build around the concept of the paradox of warning.

Task 2 - Situational awareness

Task 2 is a practical, problem-based assignment weighted at 50% of the overall portfolio mark. It should take you approximately 25 hours to complete. It is expected that the report for this task of the portfolio will be in the region of 2000 words. You are expected to conduct an analysis of the network packet capture that will be made available to you, using Wireshark. You are required to present your findings in
a factual manner to convince decision makers of a large corporation on business strategies. The capture will be made available to you in the labs and through Canvas. The analysis rig you will have to use for this activity will also be setup in the labs but you can use Wireshark from your own computer.

For the statistical analysis section, you are expected to use the automation provided by Wireshark under the ‘statistics' drop-down menu. For the activity narrative section, you are expected to explain your thought process for identifying one attack, making references to specific packets in the provided PCAP file. For the technical explanation section, you are expected to provide a technical explanation of the identified attack, making references to good quality sources. For the attack mitigation section, you are expected to synthesise and present your opinion of what controls you would deploy for preventing similar attacks from happening again.

Attachment:- Cyber Ops Portfolio.rar

Reference no: EM133020403

Questions Cloud

What is the amount of the notes payable : What is the amount of the notes payable that should be recorded as a current liability on the December 31, 20x1, Balance Sheet
How much cost would the firm anticipate : On the basis of this information, how much cost would the firm anticipate at an activity level of 220,000 units
Prepare year-end adjusting journal entries : The fair value of the net identifiable assets of Johnstone was $1,500,000. Prepare year-end adjusting journal entries to record amortization expense
What percentage of students will complete the exam : The time needed to complete a math examination is bell-shaped with a mean of 60 minutes. What percentage of students will complete exam in 50 minutes or less
Design and undertake substantial investigations : Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access
What are the factors in the race decision : a) What are the factors in the "race" decision? What are their corresponding weights in your decision? (reading of article on the below link)
Explain the importance of confirming : Explain the importance of confirming the following for text have been produced from recorded notes
Identify external influence is affecting the small business : Identify which external influence is affecting the small business in each of the following cases:
Capital budgeting for a project with timing option synopsis : Capital Budgeting for a Project with Timing Option Synopsis and Objectives Mainfreight New Zealand is a publicly listed company that offers freight transport an

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd