Discuss the effectiveness of the selected tools

Assignment Help Computer Networking
Reference no: EM132359055

Overview of Network Security Assignment Title - Potential threats and mitigation tools for Botnet

Purpose of the assessment (with ULO Mapping) - Students should be able to demonstrate their achievements in the following unit learning outcomes: Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems.

Assignment Description - The security remains a challenge in networked information systems. The ubiquity and increasing popularity of the cyber physical systems have made networked devices a powerful amplifying platform for cyberattacks. These attacks are mainly carried out by using malicious software (Malware). Generally, Malware are classified based on their primary traits. One of the primary traits of Malware is Payload capabilities.

"One of the most popular payload of Malware today is software that will allow the infected computer to be placed under the remote control of an attacker for the purpose of launching attacks. This infected robot computer is called a bot or zombie. When hundreds, thousands, or even millions of bot computers are gathered into a logical computer network, they create a botnet under the control of a bot herder".

Assume you have an interview for a cyber-security analyst position with Silver Security Solutions company. You are supposed to be prepared about the botnet, their types, threats, and mitigation tools. In this context write a report including the following sections:

A. Introduction about Botnet and its impact on the society. This section must discuss the report outline

B. Discussion of any three variants of Botnet

C. Botnet Architecture

D. Botnet operation and communication

E. Potential threats posed by a Botnet

F. Recommendations on any two mitigation techniques/tools to tackle the Botnet attack and discuss the effectiveness of the selected tools

G. Discussion on any three Networked Applications targeted/attacked by Botnet from current literature review

H. Summary

I. References.

Verified Expert

The report is about botnets.Typical discussion included botnet architecture, operations, detection methods etc.There is also discussion about the few recent attacks surfaced with botnets.There is detailed presentation of references included in the report.

Reference no: EM132359055

Questions Cloud

Analysis team that uses efficient frontier analysis : Assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25.
Configure your network using Packet Tracer : MIT Australia - MN621 Advanced Network Design Assignment - Network requirement analysis and plan. Configure your network using Packet Tracer
Social media governance for organizations : Social Media Governance for organizations: Discuss the issues that arise for organizations and the private/personal social media accounts of their employees.
Business continuity and disaster recovery : Reflect on the connection between knowledge or concepts from courses cryptography, Business Continuity and disaster recovery and how those have been,
Discuss the effectiveness of the selected tools : MIT - MN502 Overview of Network Security Assignment - Potential threats and mitigation tools for Botnet. Discuss the effectiveness of the selected tools
Explaining what NIST and FISMA are separately : This should not be a two part paper explaining what NIST and FISMA are separately. This question asks about the relationship between them.
What is the OSI security architecture : What is the OSI security architecture? List and briefly define categories of security services. List and briefly define categories of security mechanisms.
What are the personal impacts of going bankrupt : Choose one of these topics for presentations - What are the personal impacts of going bankrupt? Definition of a person who is insolvent
Describe the chi-square goodness-of-fit test : PSY 325-Describe the chi-square goodness-of-fit test. How do you know when to use one analysis over the other? Provide a real-world example.

Reviews

len2359055

8/21/2019 2:08:35 AM

Word limit 1500 – 2000. Hi, please make sure you read the whole pdf of this assignment and also follow all the instructions or format should be correct. All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2359055

8/21/2019 2:08:31 AM

Assignment Instructions: Do not use Wikipedia as a source or a reference. Must consider at least five current references from journal/conference papers and books. Must follow IEEE referencing style. Make sure you properly reference any diagrams/ graphics used in the assignment. Must submit assignment as a Word document in the Moodle Link. Viva voce (oral exam) is a hurdle for this assignment. Failing to appear for viva voce will result in securing a maximum of 60% marks of the assignment.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd