Design solutions for concrete security problems

Assignment Help Programming Languages
Reference no: EM132444960

ICT 205 - Cyber Security - Kings Own Institute

Learning Outcomes

a) Analyse and evaluate the organisational adoption of security controls
b) Design solutions for concrete security problems for distributed applications
c) Formulate and evaluate security countermeasures to reduce potential security risks
d) Analyse emerging security threats and controls.

Assessment Details

Assessment 1

Assessment type: Practical and Written Assessment, Individual assignment (1,000 words).

Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. This assessment contributes to learning outcomes a, b.

Assessment topic: Firewall Setup and Configuration

Task Details: This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications. The assignment consists of two parts.

Part A:

Use Nmap - a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment.

Features of Nmap:

o Host discovery: useful for identifying hosts in any network
o Port scanning: lets you enumerate open ports on the local or remote host
o OS detection: useful for fetching operating system and hardware information about any connected device
o App version detection: allows you to determine application name and version number
o Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE) Part B:
Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.

Case Study for the Assignment:

Carpathian Corporation has grown and needs increased security and additional capacity in the form of a new firewall. If the Carpathian Corporation wants to continue with its proposed plan for self-hosting, it needs to consider the security-related issues. It is taking the right steps by asking what security ramifications should be addressed prior to making the purchase. The Carpathian IT staff needs to take a good look at the risk factors involved with providing for its own Internet services (web servers) and where the pitfalls might occur: Security policies provide information for network users for using and auditing the network. Firewall is considered to be a part of the security policy providing necessary protection to the network and the applications.

You have been hired as the Chief Security Officer of Carpathian Corporation and its top management urges you to design the required firewall for the organization's network. Looking into the requirements of the security and adhering to information security policy you are required to provide firewall settings to secure the network from different types of possible attacks that can harm the business network.

Part A: Perform the following task.

1. Use Nmap from Kali on your Virtual Box

2. Write an introduction to include the description of the tool

3. Demonstrate four tasks Nmap can perform with respect to host scanning, domain and port scanning. The discussion should include the name and brief description of the threat and must be supported by screenshots.

4. From the report generated from the above tasks write a short Risk Mitigation Plan to identity the type of threats on the organisation's assets.

Part B: Configure the following setting on the firewall using the appropriate commands in Kali Linux.

The list of commands is provided below:

Command

Description

Ufw status

To check firewall status

Ufw enable

Enable firewall

Ufw allow

Allow services, port range and network

Ufw deny

Blocking a service

1. Check the firewall status
2. Enable or disable the firewall accordingly
3. Allow services such as TCP, SSH and samba using their port number or name
4. Verify the firewall rules after adding the above services
5. Enable the appropriate ports for the secure web server applications on a network
6. Execute commands for allowing and denying a range of ports
7. Verify the firewall rules
8. Allow HTTP from a specific subnet to access your web services

Assessment 2

Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes c, d.

Assessment topic: Security Plan and Training Program

Task Details: This assignment requires you to design a security plan based on a given case study. The learning outcomes of this assignment are to recognize the threats that exist in your current or future work place. Through your research, identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organization's information environment. Use your imagination in combination with a wide-range of material. You are required to complete and submit a security plan based on the following scenario:

Case Study Scenario:

The director of Cyber Café was concerned of the information assurance and network security concerns. The director was concerned that a virus or other forms of cyber-attack could cause extended downtime, which would have a negative impact on morale and productivity. It turned out, there were threats received via email. Law enforcement agencies were notified and the source of the emails was tracked back to one of the Cyber Café Locations. The Law enforcement agencies shut down the Cyber Cafés for 2 days during the investigation. Due to the non-existence of security policies at the Cyber Café, it could not be determined who specifically sent the email. This incident did get the attention of upper management, which made getting approval for most of the recommendations much easier.

There are actually 3 locations that fall under the Cyber Café umbrella. The primary location, known as ECC, consists of 30 workstations and is open 24 hours a day. The second location is inside a food service outlet known as CPC. This location consists of 10 workstations and is open from 1100-2200 daily. The third location is in the library. This location consists of 2 workstations and the hours vary. The Cyber Cafés are located in a very remote location. The nearest computer/electronics store is 7 hours away. Nearly 100% of the local population is either a company employee or works for a contractor supporting company operations. There is a small telephone company that services the area and provides ISP services. The charge for Dial-up Internet access is $.05 per minute. Long Distance phone calls start at $.50 per minute; due to the remote location all extra-company calls are long distance. The Cyber Café offers free Internet access and is the main form of communication between the employees and their friends and family. The availability of these Cyber Cafés has a direct impact on morale and employee productivity.

a) Identify few employees of the organization and conduct interviews to gather information on the major complaints

b) Identify what are the organizational holdings at risk

c) Apart from the threats that has been recognized by the employees develop a list of other possible threats

d) Design a security plan with the details of necessary counter-measures to manage and address the threats

e) Develop a comprehensive information security training and awareness program for the staff personnel of the organization

Attachment:- Cyber Security.rar

Reference no: EM132444960

Questions Cloud

Seeking approval for new fiscal year budget : Summarize the types of details would you present to the board of directors finance committee when seeking approval for a new fiscal year budget?
Determine if there have been any recent : Determine if there have been any recent (past 10 years) attempts by these firms to merge.What was the outcome?
Why a person have decreased urinary output : Joyce, a accident victim, Explain why a person in such severe stress is likely to have decreased urinary output (oliguria)
Explain how servant leadership can improve communities : Explain how servant leadership can improve communities and society. Why is leadership courage important to realize these changes?
Design solutions for concrete security problems : Design solutions for concrete security problems for distributed applications and Formulate and evaluate security countermeasures to reduce potential security
What could lead to greenleaf theology : What could lead to Greenleaf's theology of institutions becoming a viable model for making societal change? What stands in the way of this idea being achievable
Rokeach values survey : Select values from "Rokeach Values Survey" that will provide foundation of your model and discuss the leadership behaviors that will result from those values
Implement and use java programming language features : Design object-oriented programs using object oriented features such as encapsulation, inheritance and polymorphism in Java
Which findings should the nurse expect : Question - A nurse is caring for a child who has autism spectrum disorder. Which of the following findings should the nurse expect

Reviews

Write a Review

Programming Languages Questions & Answers

  Write a haskell program to calculates a balanced partition

Write a program in Haskell which calculates a balanced partition of N items where each item has a value between 0 and K such that the difference b/w the sum of the values of first partition,

  Create an application to run in the amazon ec2 service

In this project you will create an application to run in the Amazon EC2 service and you will also create a client that can run on local machine and access your application.

  Explain the process to develop a web page locally

Explain the process to develop a Web page locally

  Write functions

These 14 questions covers java class, Array, link list , generic class.

  Programming assignment

If the user wants to read the input from a file, then the output will also go into a different file . If the user wants to read the input interactively, then the output will go to the screen .

  Write a prolog program using swi proglog

Write a Prolog program using swi proglog

  Create a custom application using eclipse

Create a custom Application Using Eclipse Android Development

  Create a application using the mvc architecture

create a application using the MVC architecture. No scripting elements are allowed in JSP pages.

  Develops bespoke solutions for the rubber industry

Develops bespoke solutions for the rubber industry

  Design a program that models the worms behavior

Design a program that models the worm's behavior.

  Writing a class

Build a class for a type called Fraction

  Design a program that assigns seats on an airplane

Write a program that allows an instructor to keep a grade book and also design and implement a program that assigns seats on an airplane.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd