ICT 205 Cyber Security Assignment

Assignment Help Other Subject
Reference no: EM132444819 , Length: word count:1000

ICT 205 - Cyber Security - Kings Own Institute

Learning Outcomes

a) Analyse and evaluate the organisational adoption of security controls
b) Design solutions for concrete security problems for distributed applications
c) Formulate and evaluate security countermeasures to reduce potential security risks
d) Analyse emerging security threats and controls.

Assessment Details

Assessment 1

Assessment type: Practical and Written Assessment, Individual assignment (1,000 words).

Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. This assessment contributes to learning outcomes a, b.

Assessment topic: Firewall Setup and Configuration

Task Details: This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications. The assignment consists of two parts.

Part A:

Use Nmap - a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment.

Features of Nmap:

o Host discovery: useful for identifying hosts in any network
o Port scanning: lets you enumerate open ports on the local or remote host
o OS detection: useful for fetching operating system and hardware information about any connected device
o App version detection: allows you to determine application name and version number
o Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE) Part B:
Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.

Case Study for the Assignment:

Carpathian Corporation has grown and needs increased security and additional capacity in the form of a new firewall. If the Carpathian Corporation wants to continue with its proposed plan for self-hosting, it needs to consider the security-related issues. It is taking the right steps by asking what security ramifications should be addressed prior to making the purchase. The Carpathian IT staff needs to take a good look at the risk factors involved with providing for its own Internet services (web servers) and where the pitfalls might occur: Security policies provide information for network users for using and auditing the network. Firewall is considered to be a part of the security policy providing necessary protection to the network and the applications.

You have been hired as the Chief Security Officer of Carpathian Corporation and its top management urges you to design the required firewall for the organization's network. Looking into the requirements of the security and adhering to information security policy you are required to provide firewall settings to secure the network from different types of possible attacks that can harm the business network.

Part A: Perform the following task.

1. Use Nmap from Kali on your Virtual Box

2. Write an introduction to include the description of the tool

3. Demonstrate four tasks Nmap can perform with respect to host scanning, domain and port scanning. The discussion should include the name and brief description of the threat and must be supported by screenshots.

4. From the report generated from the above tasks write a short Risk Mitigation Plan to identity the type of threats on the organisation's assets.

Part B: Configure the following setting on the firewall using the appropriate commands in Kali Linux.

The list of commands is provided below:

Command

Description

Ufw status

To check firewall status

Ufw enable

Enable firewall

Ufw allow

Allow services, port range and network

Ufw deny

Blocking a service

1. Check the firewall status
2. Enable or disable the firewall accordingly
3. Allow services such as TCP, SSH and samba using their port number or name
4. Verify the firewall rules after adding the above services
5. Enable the appropriate ports for the secure web server applications on a network
6. Execute commands for allowing and denying a range of ports
7. Verify the firewall rules
8. Allow HTTP from a specific subnet to access your web services

Attachment:- Cyber Security.rar

Reference no: EM132444819

Questions Cloud

Project management of a construction project : Consider the challenges involved in project management of a construction project of this magnitude. What are some of the most significant challenges
Deerborn electronics scenario : Read the following scenario and answer the corresponding questions upon your completion.
Considering expansion in several trending markets : Leadership has asked you discuss the advantages and disadvantages of the following three types of growth strategies:
How will you attract current and new customers : How will you attract current and new customers to your mobile app by using social media?
ICT 205 Cyber Security Assignment : ICT 205 Cyber Security Assignment Help and Solution, Kings Own Institute - Assessment Writing Service - Analyse and evaluate the organisational adoption
Ethical health care organization and its employees : Organizational values statements set the tone for the ethical health care organization and its employees.
Creating objectives to meet personal or professional goals : Think about your own experience creating objectives to meet personal or professional goals.
Demonstrate the applications of the important components : This first course assignment has you demonstrate the applications of the important components dealing with business management.
Discuss the ethical role of a manager in a long-term : Discuss the ethical role of a manager in a long-term care facility when faced with a family decision to withhold nutrition and fluids to a terminal

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd