ICT 205 Cyber Security Assignment

Assignment Help Other Subject
Reference no: EM132444819 , Length: word count:1000

ICT 205 - Cyber Security - Kings Own Institute

Learning Outcomes

a) Analyse and evaluate the organisational adoption of security controls
b) Design solutions for concrete security problems for distributed applications
c) Formulate and evaluate security countermeasures to reduce potential security risks
d) Analyse emerging security threats and controls.

Assessment Details

Assessment 1

Assessment type: Practical and Written Assessment, Individual assignment (1,000 words).

Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. This assessment contributes to learning outcomes a, b.

Assessment topic: Firewall Setup and Configuration

Task Details: This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications. The assignment consists of two parts.

Part A:

Use Nmap - a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment.

Features of Nmap:

o Host discovery: useful for identifying hosts in any network
o Port scanning: lets you enumerate open ports on the local or remote host
o OS detection: useful for fetching operating system and hardware information about any connected device
o App version detection: allows you to determine application name and version number
o Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE) Part B:
Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.

Case Study for the Assignment:

Carpathian Corporation has grown and needs increased security and additional capacity in the form of a new firewall. If the Carpathian Corporation wants to continue with its proposed plan for self-hosting, it needs to consider the security-related issues. It is taking the right steps by asking what security ramifications should be addressed prior to making the purchase. The Carpathian IT staff needs to take a good look at the risk factors involved with providing for its own Internet services (web servers) and where the pitfalls might occur: Security policies provide information for network users for using and auditing the network. Firewall is considered to be a part of the security policy providing necessary protection to the network and the applications.

You have been hired as the Chief Security Officer of Carpathian Corporation and its top management urges you to design the required firewall for the organization's network. Looking into the requirements of the security and adhering to information security policy you are required to provide firewall settings to secure the network from different types of possible attacks that can harm the business network.

Part A: Perform the following task.

1. Use Nmap from Kali on your Virtual Box

2. Write an introduction to include the description of the tool

3. Demonstrate four tasks Nmap can perform with respect to host scanning, domain and port scanning. The discussion should include the name and brief description of the threat and must be supported by screenshots.

4. From the report generated from the above tasks write a short Risk Mitigation Plan to identity the type of threats on the organisation's assets.

Part B: Configure the following setting on the firewall using the appropriate commands in Kali Linux.

The list of commands is provided below:

Command

Description

Ufw status

To check firewall status

Ufw enable

Enable firewall

Ufw allow

Allow services, port range and network

Ufw deny

Blocking a service

1. Check the firewall status
2. Enable or disable the firewall accordingly
3. Allow services such as TCP, SSH and samba using their port number or name
4. Verify the firewall rules after adding the above services
5. Enable the appropriate ports for the secure web server applications on a network
6. Execute commands for allowing and denying a range of ports
7. Verify the firewall rules
8. Allow HTTP from a specific subnet to access your web services

Attachment:- Cyber Security.rar

Reference no: EM132444819

Questions Cloud

Project management of a construction project : Consider the challenges involved in project management of a construction project of this magnitude. What are some of the most significant challenges
Deerborn electronics scenario : Read the following scenario and answer the corresponding questions upon your completion.
Considering expansion in several trending markets : Leadership has asked you discuss the advantages and disadvantages of the following three types of growth strategies:
How will you attract current and new customers : How will you attract current and new customers to your mobile app by using social media?
ICT 205 Cyber Security Assignment : ICT 205 Cyber Security Assignment Help and Solution, Kings Own Institute - Assessment Writing Service - Analyse and evaluate the organisational adoption
Ethical health care organization and its employees : Organizational values statements set the tone for the ethical health care organization and its employees.
Creating objectives to meet personal or professional goals : Think about your own experience creating objectives to meet personal or professional goals.
Demonstrate the applications of the important components : This first course assignment has you demonstrate the applications of the important components dealing with business management.
Discuss the ethical role of a manager in a long-term : Discuss the ethical role of a manager in a long-term care facility when faced with a family decision to withhold nutrition and fluids to a terminal

Reviews

Write a Review

Other Subject Questions & Answers

  What can you offer a mentoree

ead the Mentoring Unit in its entirety first. In your discussion this week, please answer the three questions below as they relate to this week's Module.Keep in mind that the person you are mentoring is called a "mentoree" (not "mentee") - remembe..

  Write essay on the interest of public service

Write essay on the interest of public service and its importance to the community

  What are some of the inefficient routines in health care

Please include in-text citations. References must be no older than 6 years. Based on the scientific management theory, what are some of the routines in health.

  Describe the global health issue you selected

Post a summary of the global health issue you selected and explain how it has impacted the local population. Be specific and provide examples.

  Analyze instances of discrimination that racial group faced

Analyze in-depth 2-3 examples of stereotypes and instances of discrimination that the racial or ethnic group has faced. Show proof of inequality by comparing.

  Reflect the nature of the debate

Identify a contemporary topic (choose only one topic)that is discussed in media (affordable care, sexual assault on college campuses).

  About the different models

What are the similarities and difference between the various models of organizational culture? What do you think about the different models?

  Analyze the three pillars of successful pricing strategy

Analyze the three pillars of successful pricing strategy implementation.Create a Twitter response outlining the pricing strategy of the company.

  What are national credentialing requirements for your state

What are the national credentialing requirements for your particular State? What is the scope of practice for medical assistance in your state?

  How to mitigate the effect of the stereotype

Return to at least one colleague and propose a strategy that might help mitigate the effect of the stereotype your colleague identified.

  Why is climate change not just an environmental problem

Why is climate change not just an environmental problem but also an ethical and political issue as well? Lastly, describe possible solutions to climate crisis

  Writer a paper about sexual abuse under slavery

Writer a paper about Sexual abuse under slavery. The purpose of the review essay is to interpret how various scholars have approached a particular topic.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd