Reference no: EM133137127 , Length: word count:1650
HS3011 Security Hands-On Projects
Purpose: Exercise and develop skills required inimplementing and testing different security tools and configuration.
Students will be able to:
1. Understand the challenges and impact of factors that relate to Information Systems security management
2. Demonstrate an understanding of security frameworks, models and standards and their application to different business scenarios,
3. Communicate effectively, information systems' security concepts and controls to both technical and non-technical stakeholders
Assignment Requirements:
You are required to follow the instructions in each project and provide screen shots for the outcomes in addition to the answers to any provided questions. You are required to write a formal report including the finding of the 3 projects. This will include introduction, main body, conclusion and reference.
PROJECT 1: Examining Data Breaches
In this project, you view the biggest data breaches resulting in stolen information through a
visual format.
1. Open your web browser and enter the (if you are no longer able toaccess the site through this web address, use a search engine to search for "InformationIs Beautiful World's Biggest Data Breaches."
2. Click Hide Filter to display a visual graphic of the data breaches, as shown in Figure 1.
3. Scroll down the page to view the data breaches. Note that the size of the breach isindicated by the size of the bubble.
4. Scroll back up to the top and note the color of the bubbles that have an "InterestingStory."Click one of the bubbles and read the story.
5. Click Read a bit more.
6. Click Click to see the original report.
7. Read about the data breach. When finished, close only this tab in your browser.
8. Click Show Filter to display the filter menu.
9. Under Organisation, click Government.
10. Under Method of Leak, click All.
11. Click one of the bubbles and read the story.
12. Uncheck Government. Under Organisation, now click Tech to see the breaches that have targeted the technology industry. Click one of the bubbles and read the story.
13. At the top of the graphic, click Method of Leak so that the bubbles display how the leak occurred. Which type of leak is the most common? Why do you think this is the case?
14. Create your own filters to view different types of breaches. Does this graphic convey a better story than the textual data in the previous project?
15. How does this visualization help you with the understanding of threats?
16. Close all windows.
PROJECT 2:Write-Protecting a USB Flash Drive and Disabling a USB Port
Viruses and other malware are often spread from one computer to another by infected USBflash drives. This can be controlled by either disabling the USB port or by write-protectingthedrive so that no malware can be copied to it. Disabling the port can be accomplishedthroughchanging a Windows registry setting, while write-protecting the drive can be done throughthird-party software that can control USB device permissions. In this project, you downloadand install a software-based USB write blocker to prevent data from being written to a USBdevice and disable the USB port. You will need a USB flash drive for this project.
1. Open your web browser and enter the URL (if you are no longer able to access theprogram through the URL, use a search engine to search for"Irongeek Thumbscrew").
2. Click Download Thumbscrew.
3. If the File Download dialog box appears, click Save and follow the instructions to savethis file in a location such as your desktop or a folder designated by your instructor.
4. When the file finishes downloading, extract the files in a location such as your desktopor a folder designated by your instructor. Navigate to that location and double-clickthumbscrew.exe and follow the default installation procedures.
5. After installation, notice that a new icon appears in the system tray in the lower right
corner of the screen.
6. Insert a USB flash drive into the computer.
7. Navigate to a document on the computer.
8. Right-click the document and then select Send to.
9. Click the appropriate Removable Disk icon of the USB flash drive to copy the file to theflash drive.
10. Now make the USB flash drive write protected so it cannot be written to. Click the icon
in the system tray.
11. Click Make USB Read Only. Notice that a red circle now appears over the icon toindicate that the flash drive is write protected.
12. Navigate to a document on the computer.
13. Right-click the document and then select Send to.
14. Click the appropriate Removable Disk icon of the USB flash drive to copy the file to the
flash drive. What happens?
15. Click the icon in the system tray to change the permissions so that the USB drive is nolonger read only.
16. Now disable the USB port entirely. First remove the flash drive from the USB port.
17. In the Windows Run dialog box enter regedit.
18. In the left pane double-click HKEY_LOCAL_MACHINE to expand it.
19. Double-click SYSTEM.
20. Double-click ControlSet001.
21. Double-click Services.
22. Double-click USBSTOR as shown in Figure 2.
Figure 2: Windows Registry Editor
23. In the right pane double-click Start.
24. In Value data: change the number of 3 to 4. Be sure that Hexadecimal under Base isselected.
25. Click OK.
26. Now insert a USB flash drive into the USB port. What happens?
27. To reactivate the port, change the Value data: back to 3 and click OK.
28. Close all windows.
PROJECT 3:Preventing Vishing Attacks
Vishing, or voice phishing, continues to increase as an attack against users.First, access the online SoundCloud repository by NumberCop that contains several different recordings of vishing attacks (soundcloud.com/numbercop). After listening to several of the recordings to understand what attackers typically ask and how they craft their attacks, create guidelines for not falling prey to these attacks:
a. What would you do to help prevent users from becoming victims?
b. What messages do the attackers commonly use?
c. How do they trick users into entering their information?
d. What social engineering effectiveness reasons do they use?
Then write a series of steps that would help users resist these attacks. Write a one-page paper on your research.
Submission Guidelines
Create a business report with:
Cover page
• Document Title
• Author(s) information
Table of contents
• You have to use Microsoft Word build-in function to create a Table of Contents.
Executive Summary
• What this assignment is about and what you want to achieve (should be about 100 words, ES is differed to compare with Introduction).
Introduction
• You are required to list the major responsibilities which you should take on to help in solving the business' problem. What is your basic plan?Wheredo you start from?What do you want to achieve?
• The purpose of your work
• The structure of your report
The assignment submission should take the form of a report that thoroughly details the challenges. All information sources must be appropriately acknowledged and a full bibliography is required.
Attachment:- Information Security.rar