Evaluate the cyber security posture of an organisation

Assignment Help Other Subject
Reference no: EM133001153

BN324 Enterprise Cyber Security and Management - Web application Security, IoT Security and Cloud Security

The purpose of the assignment is to analyse the web application attacks in cyber security; evaluate available defensive resolutions, and recommend a security solution. Students will be able to complete the following ULOs:

a. Articulate cyber security imperatives to key decision makers in an enterprise organisation.
b. Evaluate the cyber security posture of an organisation.
d. Analyse the cyber security consequences of the increasing connectedness of end-point devices and control systems to an organisation's mission.
e. Devise strategies and risk management solutions.

Assignment Description

Royal Consulting Services (RCS) provides security consulting and services to over 500 clients across a wide range of enterprises in Australia. A new initiative at RCS is for its two offices in Sydney and Melbourne to provide internships to one student who is pursuing his/her postgraduate studies in reputed institutes in Sydney and Melbourne in the Networking and Cyber Security domains.

The student is required to demonstrate outstanding writing and presentation skills about his/her theoretical as well as practical knowledge related to information security domain.

To evaluate suitable candidates/groups for this prestigious internship program, RCS has advised student from multiple institutes to prepare a detailed report and a video demonstration of two port scanning tools. Detailed descriptions of these two tasks are given in the following sections.

Part I: Report
The report must include the following sections:

A. SQL Injection Attacks
SQL injection attacks continue to be a significant attack vector for threat actors to manipulate database servers. Use the Online and library resources to research these attacks. Based on your research
1. Explain how SQL injection attacks are carried out. Report any two SQL statements crafted by the threat actors to manipulate databases.
2. Discuss one recent attack that has been initiated by the SQL injection.
3. Identify and discuss possible defences against SQL injection attacks.
B. Load Balancing Algorithms
Load balancing is a technology that can help to distribute work across a network. Different algorithms are used to make decision on the load balancing. These include random allocation, round-robin, weighted round-robin, round-robin DNS load balancing, and others.
1. Explain the importance of load balancing in today's networks. What benefits are achieved with load balancing from information security perspective?
2. From current literature survey, research about two load balancing algorithms (mentioned above) and discuss their working mechanism with advantages and disadvantages.
3. Do these algorithms compromise security? Provide proper justification for your recommendation.

C. Blockchain for the Internet of Things (IoT)
With recent developments, it is predicted that there will be 18 billion internet of things (IoT) enabled devices by 2022 having a large influence across many vertical markets. Blockchain technologies have potential to track, coordinate, carry out transactions and store information from these large number of devices, enabling the creation of applications that require no centralized cloud. Based on your research and analysis
1. Discuss IoT and their Characteristics.
2. Explain the working mechanism of Blockchain and Its advantages in comparison to centralised coordination.
3. Evaluate how Blockchain can ensure security in IoT domain.

D. Cloud Computing
Cloud computing is a pay-per-use computing model in which customers pay only for the online computing resources they need. It is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provide interaction. Based on your research and analysis
1. Discuss the importance of cloud computing in today's world. Explain four service models in the cloud computing.
2. Report one security protection for cloud computing used in an organization.
3. Compare Microsoft Azure with Amazon Web Services (AWS). Create a table that lists at least five options. Include the advantages and disadvantages of each. Which would you recommend? Why?

Part II: Video Demonstration (5-7 Minutes)
Most communication in TCP/IP networks involves the exchange of information between a program running on one system (known as a process) and the same, or a corresponding process, running on a remote system. TCP/IP uses numeric value as an identifier to the application and services on these systems. This value is known as the port number.
Use the library resources/ the Internet to locate two port scanner applications. Download and install each selected tool on a Virtual machine (Kali Linux /Windows). Create a 5-7 minutes video demo using the Zoom application (along with presenters' video) addressing the following tasks.
1. Analyse and discuss the importance of port scanners.
2. Perform port scanning using both applications.
3. Identify and discuss the strengths and weakness of each scanner.
4. Which scanner would you recommend? Justify your recommendation.

Attachment:- Cyber Security and Management.rar

Reference no: EM133001153

Questions Cloud

What is the future value of a 5-year ordinary annuity : Future value of an annuity. What is the future value of a 5-year ordinary annuity with annual payments of $200, evaluated at a 15 percent interest rate?
What journal entry johnson record to recognize bad debt : What journal entry should Johnson record to recognize bad debt expense for 2021? Johnson Company calculates its allowance for uncollectible accounts
Find the effective annual cost of trade credit : In this question we will compute the effective annual cost of trade credit. Suppose a firm is offered the following the terms are 1.5/8 net 30. Find he effectiv
What is the net present value of the project : A company is considering a project with an initial cost of $8.4 million. The project will produce cash inflows of $1.9 million per year for 6 years.
Evaluate the cyber security posture of an organisation : Analyse the cyber security consequences of the increasing connectedness of end-point devices and control systems to an organisation's mission
How do calculate the rate of return on common stockholders : How do calculate the rate of return on common stockholders' equity? Sheffield Company had $42,000. Equity at the beginning of the year was $1,200,000
Salary sacrifice to achieve an accumulation target : Ferda is an engineer who likes precision in everything she does. Ferda is 55 years old and wants to retire in 10 years. She has been doing some reading about re
What is the purpose of responsibility accounting : What is the purpose of responsibility accounting? Distinguish among four (4) types of responsibility centres and provide examples of each type
Hedging tool or for speculative purposes : For each of the following situations, explain whether the individual is most likely using futures as a hedging tool or for speculative purposes a) A steel worke

Reviews

Write a Review

Other Subject Questions & Answers

  What were three main causes of new integration of eurasia

What were three main causes or sources of this new integration of Eurasia? What were three important consequences or effects?

  Evolution of the juvenile justice system in western world

Describe the history and evolution of the juvenile justice system in the Western world, and list the six categories of children recognized by the laws of most states

  How do the factors relate to eight dimensions of wellness

Based on the material in this module and your own relevant research, address the following: How do these factors relate to the eight dimensions of wellness?

  Describe the cost-effective virtual methods of training

In 200-250 words, how has technology fostered new cost-effective virtual methods of training? In your view, how must training programs continue to evolve.

  Discuss the role of delegation in the leadership process

Discuss the role of delegation in the leadership process. What qualities did Herb Callahan manifest? How can one assign work effectively?

  Discuss how gaining more knowledge of nursing theory

Briefly discuss how gaining more knowledge of nursing theory through participation in this course has improved your clinical practice thus far.

  Sexual dimorphisms of the mammalian brain

Describe and discuss sexual dimorphisms of the mammalian brain. How do they develop?

  Religion as a suggestion to overcome frustration

Religion as a suggestion to overcome frustration. Give your literature review

  Write the exact provision for each section of the bill

Write the exact provision for each section of the Bill of Rights and In your own words, explain each provision/section.

  Discuss about research study of technological innovation

Choose one of the technologies mentioned in your textbook and discuss / explain it. Please, support your answer with a research study: Is there any research.

  What would be the z score of a person

if a sample of 101 scores had a mean of 66 and a standard deviation of 15, what would be the z score of a person with a raw score 60? what would be the t-score of a person with a raw score of 70? what is the variance of the sample?

  Issues raised during this cross-cultural interchange

What problems and issues resulted from the cultural differences between key groups and from the hospital''s point of view, what cultural traits made Lu Vang''s treatment more complex?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd