Explain fundamental information security concepts

Assignment Help Other Engineering
Reference no: EM132496815 , Length: word count:1200

ITC358 IT Security - Charles Sturt University

Learning outcome 1: be able to explain fundamental information security concepts;

Learning outcome 2: be able to discuss and debate some of the security implications of computer networks, including cryptography;

Learning outcome 3: be able to compare and contrast firewall technologies;

Learning outcome 4: be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;

Learning outcome 5:be able to evaluate some of the key application security concepts and practices;

Learning outcome 6: be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.

Assessment item - Essay questions and hands-on task

A. Essay Questions
Write minimum 600 words for each of the following two short-essay questions. Both the questions are of equal value (25 marks each). You should provide credible references for each Problem according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per Problem will be appropriate.

Problem 1

Research the issue of insider threat in the context of information security and report your findings. Your report should include the following details: what insider threat means, what motivates it, types of threats involved and how to counter it.

Problem 2
Explain with a suitable example, how the Diffie-Hellman key agreement can be used for key negotiation, where more than two participants are involved. Can an attacker who captures the exchanged keying information compute the symmetric session key?

B. Hands-on Task
Port scanners usually generate lists of open, closed, and filtered ports for each scanned IP address and the information is used to identify network vulnerabilities.

In this task, you will run a simple port scan on your computer using the 'Port Scanner' produced by SolarWind. To complete this task, please follow the instructions given below.

Step 1. Download 'Port Scanner'

Step 2. Run portscanner.exe

Step 3. Under 'Scan Configuration', use your IP address in the 'Hostname and IP Address Ranges' box.

Step 4. Complete/select the remaining configurations for 'Port Ranges', 'Protocol' etc. Step 5. Now take a screenshot of your 'Scan Configuration'.
Step 6. Click on the 'SCAN' button to start scanning.

Step 7. Take a screenshot once the scan is complete.

Step 8. Using the 'SAVE RESULTS' tab, save the scan results in a .csv file. Take a screenshot of this scan report.

Attachment:- IT Security.rar

Reference no: EM132496815

Questions Cloud

Similarity between acoelomate and pseudocoelamate : What is the difference and similarity between acoelomate and pseudocoelamate.
What would the student have done differently : Organizational Conflict Analysis Paper Each student will write an 5-7-page paper on a conflict that he or she experienced in an organizational setting.
Radial symmetry and bilateral symmetry : What is the difference and similarity between radial symmetry and bilateral symmetry?
Has that helped or hurt the climate change argument : What can we make of the dispute between NASA satellites showing no climate change and NOAA ground stations showing global warming?
Explain fundamental information security concepts : Explain fundamental information security concepts and discuss and debate some of the security implications of computer networks, including cryptography
Diversity of protists living in a pond : Describe three factors that might increase the diversity of protists living in a pond.
What nist is and how it should be used by a dba : Explain in 500 words or more what NIST Is and how it should be used by a dba. Use at least three sources. Include at least 3 quotes from your sources enclosed.
Role of immunity in aging : Your lab is interested in the role of immunity in aging. To your surprise, you find that the novel transcription factor is much less functional in older mice
Do know about the federal trade commission : Do you know about the Federal Trade Commission? The mission of the Federal Trade Commission (FTC) is: (1) to prevent business practices

Reviews

Write a Review

Other Engineering Questions & Answers

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  Calculate the gasoline savings

How much gasoline do vehicles with the following fuel efficiencies consume in one year? Calculate the gasoline savings, in gallons per year, created by the following two options. Show all your work, and draw boxes around your answers.

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  Application of mechatronics engineering

Write an essay on Application of Mechatronics Engineering

  Growth chracteristics of the organism

To examine the relationship between fermenter design and operating conditions, oxygen transfer capability and microbial growth.

  Block diagram, system performance and responses

Questions based on Block Diagram, System Performance and Responses.

  Explain the difference in a technical performance measure

good understanding of Mil-Std-499 and Mil-Std-499A

  Electrode impedances

How did this procedure affect the signal observed from the electrode and the electrode impedances?

  Write a report on environmental companies

Write a report on environmental companies

  Scanning electron microscopy

Prepare a schematic diagram below of the major parts of the SEM

  Design a pumping and piping system

creating the pumping and piping system to supply cool water to the condenser

  A repulsive potential energy should be a positive one

Using the data provided on the webvista site in the file marked vdw.txt, try to develop a mathematical equation for the vdW potential we discussed in class, U(x), that best fits the data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd