Evaluate the cyber security posture of an organisation

Assignment Help Other Subject
Reference no: EM133001153

BN324 Enterprise Cyber Security and Management - Web application Security, IoT Security and Cloud Security

The purpose of the assignment is to analyse the web application attacks in cyber security; evaluate available defensive resolutions, and recommend a security solution. Students will be able to complete the following ULOs:

a. Articulate cyber security imperatives to key decision makers in an enterprise organisation.
b. Evaluate the cyber security posture of an organisation.
d. Analyse the cyber security consequences of the increasing connectedness of end-point devices and control systems to an organisation's mission.
e. Devise strategies and risk management solutions.

Assignment Description

Royal Consulting Services (RCS) provides security consulting and services to over 500 clients across a wide range of enterprises in Australia. A new initiative at RCS is for its two offices in Sydney and Melbourne to provide internships to one student who is pursuing his/her postgraduate studies in reputed institutes in Sydney and Melbourne in the Networking and Cyber Security domains.

The student is required to demonstrate outstanding writing and presentation skills about his/her theoretical as well as practical knowledge related to information security domain.

To evaluate suitable candidates/groups for this prestigious internship program, RCS has advised student from multiple institutes to prepare a detailed report and a video demonstration of two port scanning tools. Detailed descriptions of these two tasks are given in the following sections.

Part I: Report
The report must include the following sections:

A. SQL Injection Attacks
SQL injection attacks continue to be a significant attack vector for threat actors to manipulate database servers. Use the Online and library resources to research these attacks. Based on your research
1. Explain how SQL injection attacks are carried out. Report any two SQL statements crafted by the threat actors to manipulate databases.
2. Discuss one recent attack that has been initiated by the SQL injection.
3. Identify and discuss possible defences against SQL injection attacks.
B. Load Balancing Algorithms
Load balancing is a technology that can help to distribute work across a network. Different algorithms are used to make decision on the load balancing. These include random allocation, round-robin, weighted round-robin, round-robin DNS load balancing, and others.
1. Explain the importance of load balancing in today's networks. What benefits are achieved with load balancing from information security perspective?
2. From current literature survey, research about two load balancing algorithms (mentioned above) and discuss their working mechanism with advantages and disadvantages.
3. Do these algorithms compromise security? Provide proper justification for your recommendation.

C. Blockchain for the Internet of Things (IoT)
With recent developments, it is predicted that there will be 18 billion internet of things (IoT) enabled devices by 2022 having a large influence across many vertical markets. Blockchain technologies have potential to track, coordinate, carry out transactions and store information from these large number of devices, enabling the creation of applications that require no centralized cloud. Based on your research and analysis
1. Discuss IoT and their Characteristics.
2. Explain the working mechanism of Blockchain and Its advantages in comparison to centralised coordination.
3. Evaluate how Blockchain can ensure security in IoT domain.

D. Cloud Computing
Cloud computing is a pay-per-use computing model in which customers pay only for the online computing resources they need. It is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provide interaction. Based on your research and analysis
1. Discuss the importance of cloud computing in today's world. Explain four service models in the cloud computing.
2. Report one security protection for cloud computing used in an organization.
3. Compare Microsoft Azure with Amazon Web Services (AWS). Create a table that lists at least five options. Include the advantages and disadvantages of each. Which would you recommend? Why?

Part II: Video Demonstration (5-7 Minutes)
Most communication in TCP/IP networks involves the exchange of information between a program running on one system (known as a process) and the same, or a corresponding process, running on a remote system. TCP/IP uses numeric value as an identifier to the application and services on these systems. This value is known as the port number.
Use the library resources/ the Internet to locate two port scanner applications. Download and install each selected tool on a Virtual machine (Kali Linux /Windows). Create a 5-7 minutes video demo using the Zoom application (along with presenters' video) addressing the following tasks.
1. Analyse and discuss the importance of port scanners.
2. Perform port scanning using both applications.
3. Identify and discuss the strengths and weakness of each scanner.
4. Which scanner would you recommend? Justify your recommendation.

Attachment:- Cyber Security and Management.rar

Reference no: EM133001153

Questions Cloud

What is the future value of a 5-year ordinary annuity : Future value of an annuity. What is the future value of a 5-year ordinary annuity with annual payments of $200, evaluated at a 15 percent interest rate?
What journal entry johnson record to recognize bad debt : What journal entry should Johnson record to recognize bad debt expense for 2021? Johnson Company calculates its allowance for uncollectible accounts
Find the effective annual cost of trade credit : In this question we will compute the effective annual cost of trade credit. Suppose a firm is offered the following the terms are 1.5/8 net 30. Find he effectiv
What is the net present value of the project : A company is considering a project with an initial cost of $8.4 million. The project will produce cash inflows of $1.9 million per year for 6 years.
Evaluate the cyber security posture of an organisation : Analyse the cyber security consequences of the increasing connectedness of end-point devices and control systems to an organisation's mission
How do calculate the rate of return on common stockholders : How do calculate the rate of return on common stockholders' equity? Sheffield Company had $42,000. Equity at the beginning of the year was $1,200,000
Salary sacrifice to achieve an accumulation target : Ferda is an engineer who likes precision in everything she does. Ferda is 55 years old and wants to retire in 10 years. She has been doing some reading about re
What is the purpose of responsibility accounting : What is the purpose of responsibility accounting? Distinguish among four (4) types of responsibility centres and provide examples of each type
Hedging tool or for speculative purposes : For each of the following situations, explain whether the individual is most likely using futures as a hedging tool or for speculative purposes a) A steel worke

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd