Develop skills required inimplementing and testing

Assignment Help Other Subject
Reference no: EM133137127 , Length: word count:1650

HS3011 Security Hands-On Projects

Purpose: Exercise and develop skills required inimplementing and testing different security tools and configuration.
Students will be able to:
1. Understand the challenges and impact of factors that relate to Information Systems security management
2. Demonstrate an understanding of security frameworks, models and standards and their application to different business scenarios,
3. Communicate effectively, information systems' security concepts and controls to both technical and non-technical stakeholders

Assignment Requirements:

You are required to follow the instructions in each project and provide screen shots for the outcomes in addition to the answers to any provided questions. You are required to write a formal report including the finding of the 3 projects. This will include introduction, main body, conclusion and reference.

PROJECT 1: Examining Data Breaches

In this project, you view the biggest data breaches resulting in stolen information through a
visual format.

1. Open your web browser and enter the (if you are no longer able toaccess the site through this web address, use a search engine to search for "InformationIs Beautiful World's Biggest Data Breaches."

2. Click Hide Filter to display a visual graphic of the data breaches, as shown in Figure 1.

3. Scroll down the page to view the data breaches. Note that the size of the breach isindicated by the size of the bubble.

4. Scroll back up to the top and note the color of the bubbles that have an "InterestingStory."Click one of the bubbles and read the story.

5. Click Read a bit more.

6. Click Click to see the original report.

7. Read about the data breach. When finished, close only this tab in your browser.

8. Click Show Filter to display the filter menu.

9. Under Organisation, click Government.

10. Under Method of Leak, click All.

11. Click one of the bubbles and read the story.

12. Uncheck Government. Under Organisation, now click Tech to see the breaches that have targeted the technology industry. Click one of the bubbles and read the story.

13. At the top of the graphic, click Method of Leak so that the bubbles display how the leak occurred. Which type of leak is the most common? Why do you think this is the case?

14. Create your own filters to view different types of breaches. Does this graphic convey a better story than the textual data in the previous project?

15. How does this visualization help you with the understanding of threats?

16. Close all windows.

PROJECT 2:Write-Protecting a USB Flash Drive and Disabling a USB Port

Viruses and other malware are often spread from one computer to another by infected USBflash drives. This can be controlled by either disabling the USB port or by write-protectingthedrive so that no malware can be copied to it. Disabling the port can be accomplishedthroughchanging a Windows registry setting, while write-protecting the drive can be done throughthird-party software that can control USB device permissions. In this project, you downloadand install a software-based USB write blocker to prevent data from being written to a USBdevice and disable the USB port. You will need a USB flash drive for this project.

1. Open your web browser and enter the URL (if you are no longer able to access theprogram through the URL, use a search engine to search for"Irongeek Thumbscrew").
2. Click Download Thumbscrew.
3. If the File Download dialog box appears, click Save and follow the instructions to savethis file in a location such as your desktop or a folder designated by your instructor.
4. When the file finishes downloading, extract the files in a location such as your desktopor a folder designated by your instructor. Navigate to that location and double-clickthumbscrew.exe and follow the default installation procedures.
5. After installation, notice that a new icon appears in the system tray in the lower right
corner of the screen.
6. Insert a USB flash drive into the computer.
7. Navigate to a document on the computer.
8. Right-click the document and then select Send to.
9. Click the appropriate Removable Disk icon of the USB flash drive to copy the file to theflash drive.
10. Now make the USB flash drive write protected so it cannot be written to. Click the icon
in the system tray.
11. Click Make USB Read Only. Notice that a red circle now appears over the icon toindicate that the flash drive is write protected.
12. Navigate to a document on the computer.
13. Right-click the document and then select Send to.
14. Click the appropriate Removable Disk icon of the USB flash drive to copy the file to the
flash drive. What happens?
15. Click the icon in the system tray to change the permissions so that the USB drive is nolonger read only.
16. Now disable the USB port entirely. First remove the flash drive from the USB port.
17. In the Windows Run dialog box enter regedit.
18. In the left pane double-click HKEY_LOCAL_MACHINE to expand it.
19. Double-click SYSTEM.
20. Double-click ControlSet001.
21. Double-click Services.
22. Double-click USBSTOR as shown in Figure 2.

Figure 2: Windows Registry Editor

23. In the right pane double-click Start.
24. In Value data: change the number of 3 to 4. Be sure that Hexadecimal under Base isselected.
25. Click OK.
26. Now insert a USB flash drive into the USB port. What happens?
27. To reactivate the port, change the Value data: back to 3 and click OK.
28. Close all windows.

PROJECT 3:Preventing Vishing Attacks

Vishing, or voice phishing, continues to increase as an attack against users.First, access the online SoundCloud repository by NumberCop that contains several different recordings of vishing attacks (soundcloud.com/numbercop). After listening to several of the recordings to understand what attackers typically ask and how they craft their attacks, create guidelines for not falling prey to these attacks:

a. What would you do to help prevent users from becoming victims?
b. What messages do the attackers commonly use?
c. How do they trick users into entering their information?
d. What social engineering effectiveness reasons do they use?

Then write a series of steps that would help users resist these attacks. Write a one-page paper on your research.

Submission Guidelines

Create a business report with:

Cover page
• Document Title
• Author(s) information

Table of contents
• You have to use Microsoft Word build-in function to create a Table of Contents.

Executive Summary
• What this assignment is about and what you want to achieve (should be about 100 words, ES is differed to compare with Introduction).
Introduction
• You are required to list the major responsibilities which you should take on to help in solving the business' problem. What is your basic plan?Wheredo you start from?What do you want to achieve?
• The purpose of your work
• The structure of your report

The assignment submission should take the form of a report that thoroughly details the challenges. All information sources must be appropriately acknowledged and a full bibliography is required.

Attachment:- Information Security.rar

Reference no: EM133137127

Questions Cloud

Interactive design involves understanding users : "Interactive Design involves understanding users, developing prototypes, and evaluating and refining the product in a participative manner"
Examine real-world implementations of us compliance laws : Compliance is important because it is the act of following laws, rules, and regulations that apply to an organization.
What is the npv of the r&d investment : If you invest in R&D, you estimate that it will take 2 years to know whether the drug is successful or not. What is the NPV of the R&D investment
What is mass of the helium : If a balloon is filled with 1000 m3 of helium (at 0 oC temperature and 1 Atm pressure). What is the mass of the helium?
Develop skills required inimplementing and testing : Communicate effectively, information systems' security concepts and controls to both technical and non-technical stakeholders
Differences between financial and managerial accounting : Discuss the differences between financial and managerial accounting and how each applies to healthcare facilities
Network scanning techniques : Explain in your own words what type of information can be obtained by using network scanning techniques
What are the income tax consequences for each : Jacob's Jewels has a December 31 fiscal period year end. What are the income tax consequences for each of the 2021 to 2025 fiscal periods on the business income
What is the maximum amount of cca that michaels can claim : Michaels Inc. has a December 31 year end. What is the maximum amount of CCA that Michaels can claim with respect to the building for 2021

Reviews

Write a Review

Other Subject Questions & Answers

  Differentiation strategies in order to implement instruction

It is important to design and develop multiple forms of instructional and differentiation strategies in order to implement instruction aligned to standards

  Impacting the business operations and administration

Analyze and evaluate the two most salient trends impacting the business operations and/or administration.

  What is the meaning of a derived demand

The demand for labor is said to be a "derived" demand. What is the meaning of a derived demand? How does this concept help to determine the demand for labor?

  Identify one msn essential that most relates to the topic

Discuss and provide 2 specific ways Early Conceptualization About Nursing Theory can be applied to advanced practice nursing. Identify one MSN Essential that.

  What are the assumptions underpinning this theory

Choose a middle-range theory or grand theory in nursing that, in your opinion, can be applied to research.

  Individual business decisions

To what extent can individual business decisions (as opposed to economic forces) explain deterioration in working conditions for many workers?

  What you have learned about social change as a social issue

What you have learned about social change as a research problem. Support your insights with academic citations from the Learning Resources.

  Initial market penetration

Entry strategies (initial market penetration – selling to the first customers) What tactics will you use in order to realize/achieve/implement your entry strategy? please describe how you intend to enter the market and acquire your first customer(s).

  Intellectual properties and real properties

How to brief a case involving Intellectual Properties and Real Properties.

  Describe your experience regarding performance discussion

Describe your experience regarding the performance discussion.Explain proven and effective ways to listen appropriately, resolve conflict, and negotiate.

  Discuss adult romantic relationships

How have your personal experiences and what you have learned in this course about adult relationships and divorce

  A roulette wheel has 38 numbers eighteen of the numbers are

a roulette wheel has 38 numbers. eighteen of the numbers are black eighteen are red and two are green. when the wheel

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd