Develop skills required inimplementing and testing

Assignment Help Other Subject
Reference no: EM133137127 , Length: word count:1650

HS3011 Security Hands-On Projects

Purpose: Exercise and develop skills required inimplementing and testing different security tools and configuration.
Students will be able to:
1. Understand the challenges and impact of factors that relate to Information Systems security management
2. Demonstrate an understanding of security frameworks, models and standards and their application to different business scenarios,
3. Communicate effectively, information systems' security concepts and controls to both technical and non-technical stakeholders

Assignment Requirements:

You are required to follow the instructions in each project and provide screen shots for the outcomes in addition to the answers to any provided questions. You are required to write a formal report including the finding of the 3 projects. This will include introduction, main body, conclusion and reference.

PROJECT 1: Examining Data Breaches

In this project, you view the biggest data breaches resulting in stolen information through a
visual format.

1. Open your web browser and enter the (if you are no longer able toaccess the site through this web address, use a search engine to search for "InformationIs Beautiful World's Biggest Data Breaches."

2. Click Hide Filter to display a visual graphic of the data breaches, as shown in Figure 1.

3. Scroll down the page to view the data breaches. Note that the size of the breach isindicated by the size of the bubble.

4. Scroll back up to the top and note the color of the bubbles that have an "InterestingStory."Click one of the bubbles and read the story.

5. Click Read a bit more.

6. Click Click to see the original report.

7. Read about the data breach. When finished, close only this tab in your browser.

8. Click Show Filter to display the filter menu.

9. Under Organisation, click Government.

10. Under Method of Leak, click All.

11. Click one of the bubbles and read the story.

12. Uncheck Government. Under Organisation, now click Tech to see the breaches that have targeted the technology industry. Click one of the bubbles and read the story.

13. At the top of the graphic, click Method of Leak so that the bubbles display how the leak occurred. Which type of leak is the most common? Why do you think this is the case?

14. Create your own filters to view different types of breaches. Does this graphic convey a better story than the textual data in the previous project?

15. How does this visualization help you with the understanding of threats?

16. Close all windows.

PROJECT 2:Write-Protecting a USB Flash Drive and Disabling a USB Port

Viruses and other malware are often spread from one computer to another by infected USBflash drives. This can be controlled by either disabling the USB port or by write-protectingthedrive so that no malware can be copied to it. Disabling the port can be accomplishedthroughchanging a Windows registry setting, while write-protecting the drive can be done throughthird-party software that can control USB device permissions. In this project, you downloadand install a software-based USB write blocker to prevent data from being written to a USBdevice and disable the USB port. You will need a USB flash drive for this project.

1. Open your web browser and enter the URL (if you are no longer able to access theprogram through the URL, use a search engine to search for"Irongeek Thumbscrew").
2. Click Download Thumbscrew.
3. If the File Download dialog box appears, click Save and follow the instructions to savethis file in a location such as your desktop or a folder designated by your instructor.
4. When the file finishes downloading, extract the files in a location such as your desktopor a folder designated by your instructor. Navigate to that location and double-clickthumbscrew.exe and follow the default installation procedures.
5. After installation, notice that a new icon appears in the system tray in the lower right
corner of the screen.
6. Insert a USB flash drive into the computer.
7. Navigate to a document on the computer.
8. Right-click the document and then select Send to.
9. Click the appropriate Removable Disk icon of the USB flash drive to copy the file to theflash drive.
10. Now make the USB flash drive write protected so it cannot be written to. Click the icon
in the system tray.
11. Click Make USB Read Only. Notice that a red circle now appears over the icon toindicate that the flash drive is write protected.
12. Navigate to a document on the computer.
13. Right-click the document and then select Send to.
14. Click the appropriate Removable Disk icon of the USB flash drive to copy the file to the
flash drive. What happens?
15. Click the icon in the system tray to change the permissions so that the USB drive is nolonger read only.
16. Now disable the USB port entirely. First remove the flash drive from the USB port.
17. In the Windows Run dialog box enter regedit.
18. In the left pane double-click HKEY_LOCAL_MACHINE to expand it.
19. Double-click SYSTEM.
20. Double-click ControlSet001.
21. Double-click Services.
22. Double-click USBSTOR as shown in Figure 2.

Figure 2: Windows Registry Editor

23. In the right pane double-click Start.
24. In Value data: change the number of 3 to 4. Be sure that Hexadecimal under Base isselected.
25. Click OK.
26. Now insert a USB flash drive into the USB port. What happens?
27. To reactivate the port, change the Value data: back to 3 and click OK.
28. Close all windows.

PROJECT 3:Preventing Vishing Attacks

Vishing, or voice phishing, continues to increase as an attack against users.First, access the online SoundCloud repository by NumberCop that contains several different recordings of vishing attacks (soundcloud.com/numbercop). After listening to several of the recordings to understand what attackers typically ask and how they craft their attacks, create guidelines for not falling prey to these attacks:

a. What would you do to help prevent users from becoming victims?
b. What messages do the attackers commonly use?
c. How do they trick users into entering their information?
d. What social engineering effectiveness reasons do they use?

Then write a series of steps that would help users resist these attacks. Write a one-page paper on your research.

Submission Guidelines

Create a business report with:

Cover page
• Document Title
• Author(s) information

Table of contents
• You have to use Microsoft Word build-in function to create a Table of Contents.

Executive Summary
• What this assignment is about and what you want to achieve (should be about 100 words, ES is differed to compare with Introduction).
Introduction
• You are required to list the major responsibilities which you should take on to help in solving the business' problem. What is your basic plan?Wheredo you start from?What do you want to achieve?
• The purpose of your work
• The structure of your report

The assignment submission should take the form of a report that thoroughly details the challenges. All information sources must be appropriately acknowledged and a full bibliography is required.

Attachment:- Information Security.rar

Reference no: EM133137127

Questions Cloud

Interactive design involves understanding users : "Interactive Design involves understanding users, developing prototypes, and evaluating and refining the product in a participative manner"
Examine real-world implementations of us compliance laws : Compliance is important because it is the act of following laws, rules, and regulations that apply to an organization.
What is the npv of the r&d investment : If you invest in R&D, you estimate that it will take 2 years to know whether the drug is successful or not. What is the NPV of the R&D investment
What is mass of the helium : If a balloon is filled with 1000 m3 of helium (at 0 oC temperature and 1 Atm pressure). What is the mass of the helium?
Develop skills required inimplementing and testing : Communicate effectively, information systems' security concepts and controls to both technical and non-technical stakeholders
Differences between financial and managerial accounting : Discuss the differences between financial and managerial accounting and how each applies to healthcare facilities
Network scanning techniques : Explain in your own words what type of information can be obtained by using network scanning techniques
What are the income tax consequences for each : Jacob's Jewels has a December 31 fiscal period year end. What are the income tax consequences for each of the 2021 to 2025 fiscal periods on the business income
What is the maximum amount of cca that michaels can claim : Michaels Inc. has a December 31 year end. What is the maximum amount of CCA that Michaels can claim with respect to the building for 2021

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd