Explain the major methodologies for secure networks

Assignment Help Computer Networking
Reference no: EM132756133

MN502 Overview of Network Security - Melbourne Institute of Technology

Assessment Title - Security in Networked Systems

Purpose of the assessment (with ULO Mapping) - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

a. Explain the major methodologies for secure networks and what threats they address;

b. Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description -

Royal Consulting Services (RCS) provides security consulting and services to over 500 clients across a wide range of enterprises in Australia. A new initiative at RCS is for its two offices in Sydney and Melbourne to provide internships to groups of students who are pursuing their postgraduate studies in reputed institutes in Sydney and Melbourne in the Networking and Cyber Security domains.

Student groups are required to demonstrate outstanding writing and presentation skills about their theoretical as well as practical knowledge related to information security domain. Further, groups must demonstrate excellent teamwork and collaboration skills.

To evaluate suitable candidates/groups for this prestigious internship program, RCS has advised student groups from multiple institutes to prepare a detailed report and a video demonstration of two port scanning tools. Detailed descriptions of these two tasks are given in the following sections.

Part I: Report

The report must include the following sections:

A. SQL Injection Attacks

SQL injection attacks continue to be a significant attack vector for threat actors to manipulate database servers. Use the Online and library resources to research these attacks. Based on your research

1. Explain how SQL injection attacks are carried out. Report any two SQL statements crafted by the threat actors to manipulate databases.

2. Discuss one recent attack that has been initiated by the SQL injection.

3. Identify and discuss possible defenses against SQL injection attacks.

B. Load Balancing Algorithms

Load balancing is a technology that can help to distribute work across a network. Different algorithms are used to make decision on the load balancing. These include random allocation, round-robin, weighted round-robin, round-robin DNS load balancing, and others.

1. Explain the importance of load balancing in today's networks. What benefits are achieved with load balancing from information security perspective?

2. From current literature survey, research about two load balancing algorithms (mentioned above) and discuss their working mechanism with advantages and disadvantages.

3. Do these algorithms compromise security? Provide proper justification regarding your recommendation.

C. Blockchain for the Internet of Things (IoT)

With recent developments, it is predicted that there will be 18 billion internet of things (IoT) enabled devices by 2022 having a large influence across many vertical markets. Blockchain technologies have potential to track, coordinate, carry out transactions and store information from these large number of devices, enabling the creation of applications that require no centralized cloud. Based on your research and analysis

1. Discuss IoT and their Characteristics.

2. Explain the working mechanism of Blockchain and Its advantages in comparison to centralised coordination.

3. Evaluate how Blockchain can ensure security in IoT domain.

D. Cloud Computing

Cloud computing is a pay-per-use computing model in which customers pay only for the online computing resources they need. It is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provide interaction. Based on your research and analysis

1. Discuss the importance of cloud computing in today's world. Explain four service models in the cloud computing.

2. Report one security protection for cloud computing used in an organization.

3. Compare Microsoft Azure with Amazon Web Services (AWS). Create a table that lists at least five options. Include the advantages and disadvantages of each. Which would you recommend? Why?

E. References

Must consider at least 10 current references from journal/conference papers and books. Must follow the IEEE style.

Part II: Video Demonstration (5-7 Minutes)

Most communication in TCP/IP networks involves the exchange of information between a program running on one system (known as a process) and the same, or a corresponding process, running on a remote system. TCP/IP uses numeric value as an identifier to the application and services on these systems. This value is known as the port number.

Use the library resources/ the Internet to locate two port scanner applications. Download and install each selected tool on Virtual machine (Kali Linux /Windows). As a team of four, create a 5-7 minutes video demo using Zoom application (along with presenters' video) addressing the following tasks.

1. Analyse and discuss the importance of port scanners.

2. Perform port scanning using both applications.

3. Identify and discuss the strengths and weakness of each scanner.

4. Which scanner would you recommend? Justify your recommendation.

NOTE: To complete a shared goal, both teamwork and collaboration play an important role. Therefore, for this complete task, excellent teamwork and collaboration skills must be demonstrated. The assignment should be submitted on the Moodle in two separate files: The report should be submitted as a Word file and the demonstration should be submitted as a video file. Demonstration video must include presenters' video. It must be created using Zoom app.

Reference no: EM132756133

Questions Cloud

How are property and equipment measured under aspe : How are property, plant, and equipment measured under ASPE? Include both initial and subsequent measurement in your discussion. What are the measurement options
Prepare the journal entry to record the issuance of the bond : Blossom Company issued $510,000, 9%, 20-year bonds on January 1, 2020, at 104. Interest is payable annually on January 1. Blossom uses straight-line.
Model the woolworths priority assistance service : Create the "Student Admission" Enterprise Architecture using the ArchiMate 3 model notation showing the 3 core with their respective service layers
What was the total dollar annual cost of the revolver : Sanders Enterprises arranged a revolving credit agreement of $9,000,000 with a group of banks. The firm paid an annual commitment fee of 0.5% of the unused.
Explain the major methodologies for secure networks : Explain the major methodologies for secure networks and what threats they address and Identify and report network threats, select and implement appropriate
What price should the company quote to manufacture a machine : What price should the company quote to manufacture a machine which, it is estimated, will require an expenditure of Rs 8000 on materials; and Rs. 6000 on wages.
How the data was analysed and the main message of the report : Paste in computer output that measures evidence for the claim there is a relationship between the variables "Duration?" and "engagement score
Calculate the beta and expected return of the portfolio : Ms Tan is the manager of a portfolio consisting of stocks as shown below. The market risk premium is 8% and the risk-free rate is 3%.
What is the under or overapplied manufacturing overhead : Marco Furniture Making Company uses the direct labor hours methodm for applying manufacturing overhead. The overhead application rate for 2008 is P8.60 per.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd