ICT 205 Cyber Security Assignment

Assignment Help Computer Network Security
Reference no: EM132490507

ICT 205 Cyber Security - Kings Own Institute

Learning Outcome 1: Analyse and evaluate the organisational adoption of security controls
Learning Outcome 2: Design solutions for concrete security problems for distributed applications
Learning Outcome 3: Formulate and evaluate security countermeasures to reduce potential security risks
Learning Outcome 4: Analyse emerging security threats and controls.

Assessment 1

Assessment type: Practical and Written Assessment, Individual assignment (1,000 words).

Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. Analyse and evaluate the organizational adoption of security controls.
Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes a, b.

Assessment topic: Firewall Setup and Configuration

Task Details: This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications.

The assignment consists of two parts:

Part A: Use Nmap - a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment.

Part B: Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.

Case Study for the Assignment: Canadian Cafe is a small business enterprise comprising franchise at different geographical locations with appropriate network facilities to reach their business requirements. A secure network across their geographical locations is one of the objectives of a business organization. The System and Network administrator of the organization realizes that the security of the network has to be addressed. it is necessary to impose certain level of filtering for the network to be secure and that is when it can sustain from attacks, which may damage the whole network. To develop a secure network, network administrators must have a good understanding of the attacks and appropriate mitigation techniques. It is necessary to identify the assets that need to be protected by performing a risk analysis, threats and vulnerabilities that the network may pose. After risk analysis, designing a set of security policies is very important to provide high level of security.

The executive management of Canadian Cafe urges you to design the necessary security requirements. Looking into the requirements of the security and adhering to information security policy as a security team decides to configure firewall to secure the network from different types of possible threats and attacks that can harm the business network.

Part A: Perform the following task.

1. Use Nmap from Kali on your Virtual Box

2. Write an introduction to include the description of the tool Features of Nmap:
• Host discovery: useful for identifying hosts in any network
• Port scanning: lets you enumerate open ports on the local or remote host
• OS detection: useful for fetching operating system and hardware information about any connected device
• App version detection: allows you to determine application name and version number
• Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE)

3. Demonstrate four tasks Nmap can perform. Discuss on how this tool can be used for mitigating differ types of threats. The discussion should include the name and brief description of the threat and must be supported by screenshots.

4. Discuss the performance of the tools based on the following:
a. Security features and
b. Time taken to detect any threat

5. Perform the firewall testing using Nmap

6. From the report generated from the above tasks write a short Risk Mitigation Plan to identity the type of threats on the organisation's assets.

Part B: Configure the following setting on the firewall using the appropriate commands in Kali Linux. The list of commands is provided below:

1. Check the firewall status
2. Enable or disable the firewall accordingly
3. Allow services such as TCP, SSH and samba using their port number or name
4. Verify the firewall rules after adding the above services
5. Secure a web server by blocking HTTP service and allowing HTTPS service only
6. Allow a range of ports from 20 to 80 and deny a range of ports from 100 to 500
7. Verify the firewall rules
8. Allow HTTP from a specific subnet to access your web services
9. Block connections to a network interface

Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes c, d.

Assessment topic: Security Plan and Training Program

Task Details: This assignment requires you to design a security plan based on a given case study. The learning outcomes of this assignment are to recognize the threats that exist in your current or future work place. Through your research, identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organization's information environment. Use your imagination in combination with a wide-range of material.

You are required to complete and submit a security plan based on the following scenario: The assignment submission needs to satisfy two requirements:

Part A: Report submission on Moodle - Week 11 Part B: Presentation - Week 12

Case Study Scenario: You are the recently appointed head of a security team responsible for protecting the information holdings of Innovations IT which is a consulting agency for IT based technologies comprising of 1500 staffs. The organization locates in the central business district of the city. The security team is responsible for administering the security of information from deliberate and accidental threats. The recent information security management team found that the security has not been properly addressed in some key areas such as incident response, disaster recovery, business continuity, social engineering attacks and lack of personnel awareness of the various threats to information, and poor password security. The above issues identified needed urgent remedy. Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team. As the head of the team, it becomes your responsibility to ask your team to analyze the possible threats and provide a report on the detailed security countermeasures for all the possible threats.

As a part of the security analysis, the tasks of the team are to:

a) Identify and describe the organizational holdings (assets) at risk
b) Identify and describe the potential security threats to the organization
c) Design the necessary security counter-measures to manage and address the threats
d) Develop a comprehensive information security training and awareness program for the users of the organization belonging to the different levels of the organizational hierarchy

Assessment 3

Purpose: The purpose of the final examination is to test student understanding of all topics covered in this subject. This assessment contributes specifically to learning outcomes a, b, c, and d.

Topic: The examination may cover content from any part of the subject.

Task Details: Students will be expected to answer written response questions

Late Penalties and Extensions

An important part of business life and key to achieving KOI's graduate outcome of Professional Skills is the ability to manage workloads and meet deadlines. Consequently, any assessment items such as in-class quizzes and assignments missed or submitted after the due date/time will attract a penalty (see below).

Students who miss mid-trimester tests and final exams without a valid and accepted reason (see below) may not be granted a deferred exam and will be awarded 0 marks for assessment item. These penalties are designed to encourage students to develop good time management practices, and create equity for all students.

Attachment:- Cyber Security.rar

Reference no: EM132490507

Questions Cloud

What is the cash flow from operating activities : What is the cash flow from operating activities? Which company will report the lowest amount of cash flow from operating activities on the 2020 statement ?
Construct a framework for care of your staff : After reviewing our three nursing theorists presented this week in chapters 29, 30, and 31. Let's reflect upon the events that are taking place in healthcare.
Make the journal entry to record the redemption : Make the journal entry to record the redemption. Assume that on July 1, 2019, Concord Co. redeems half of the bonds at a cost of $1,126,600 plus
What is best estimate of the after-tax cost of debt : What is best Estimate of the after-tax cost of debt? Assume that you have been hired as a consultant by CGT, a major producer of chemicals and plastics
ICT 205 Cyber Security Assignment : ICT 205 Cyber Security Assignment help and solution, Kings Own Institute - assessment writing service - Analyse and evaluate the organisational adoption
What is the final temperature of the air : What is the final temperature of the air? What is the final volume of the air? What is the final volume of the air? What is the final pressure of the air?
Discuss the impact on the health care delivery system : Research public health issues on the "Climate Change" or "Topics and Issues" pages of the American Public Health Association (APHA) website. Investigate a.
What constant rate is the stock expected to grow : At what constant rate is the stock expected to grow after Year 3? Round your answer to two decimal places. Do not round your intermediate calculations.
Find the resulting current : Three 12 O resistors are connected in parallel and then connected to a 6.0 V battery. Find the resulting current.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd