ICT 205 Cyber Security Assignment

Assignment Help Computer Network Security
Reference no: EM132490507

ICT 205 Cyber Security - Kings Own Institute

Learning Outcome 1: Analyse and evaluate the organisational adoption of security controls
Learning Outcome 2: Design solutions for concrete security problems for distributed applications
Learning Outcome 3: Formulate and evaluate security countermeasures to reduce potential security risks
Learning Outcome 4: Analyse emerging security threats and controls.

Assessment 1

Assessment type: Practical and Written Assessment, Individual assignment (1,000 words).

Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. Analyse and evaluate the organizational adoption of security controls.
Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes a, b.

Assessment topic: Firewall Setup and Configuration

Task Details: This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications.

The assignment consists of two parts:

Part A: Use Nmap - a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment.

Part B: Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.

Case Study for the Assignment: Canadian Cafe is a small business enterprise comprising franchise at different geographical locations with appropriate network facilities to reach their business requirements. A secure network across their geographical locations is one of the objectives of a business organization. The System and Network administrator of the organization realizes that the security of the network has to be addressed. it is necessary to impose certain level of filtering for the network to be secure and that is when it can sustain from attacks, which may damage the whole network. To develop a secure network, network administrators must have a good understanding of the attacks and appropriate mitigation techniques. It is necessary to identify the assets that need to be protected by performing a risk analysis, threats and vulnerabilities that the network may pose. After risk analysis, designing a set of security policies is very important to provide high level of security.

The executive management of Canadian Cafe urges you to design the necessary security requirements. Looking into the requirements of the security and adhering to information security policy as a security team decides to configure firewall to secure the network from different types of possible threats and attacks that can harm the business network.

Part A: Perform the following task.

1. Use Nmap from Kali on your Virtual Box

2. Write an introduction to include the description of the tool Features of Nmap:
• Host discovery: useful for identifying hosts in any network
• Port scanning: lets you enumerate open ports on the local or remote host
• OS detection: useful for fetching operating system and hardware information about any connected device
• App version detection: allows you to determine application name and version number
• Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE)

3. Demonstrate four tasks Nmap can perform. Discuss on how this tool can be used for mitigating differ types of threats. The discussion should include the name and brief description of the threat and must be supported by screenshots.

4. Discuss the performance of the tools based on the following:
a. Security features and
b. Time taken to detect any threat

5. Perform the firewall testing using Nmap

6. From the report generated from the above tasks write a short Risk Mitigation Plan to identity the type of threats on the organisation's assets.

Part B: Configure the following setting on the firewall using the appropriate commands in Kali Linux. The list of commands is provided below:

1. Check the firewall status
2. Enable or disable the firewall accordingly
3. Allow services such as TCP, SSH and samba using their port number or name
4. Verify the firewall rules after adding the above services
5. Secure a web server by blocking HTTP service and allowing HTTPS service only
6. Allow a range of ports from 20 to 80 and deny a range of ports from 100 to 500
7. Verify the firewall rules
8. Allow HTTP from a specific subnet to access your web services
9. Block connections to a network interface

Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes c, d.

Assessment topic: Security Plan and Training Program

Task Details: This assignment requires you to design a security plan based on a given case study. The learning outcomes of this assignment are to recognize the threats that exist in your current or future work place. Through your research, identify the threats, outline security guidelines and develop a robust and pragmatic training programme. You should develop a plan that you would regard as helpful to you, the information user, as well as protecting your organization's information environment. Use your imagination in combination with a wide-range of material.

You are required to complete and submit a security plan based on the following scenario: The assignment submission needs to satisfy two requirements:

Part A: Report submission on Moodle - Week 11 Part B: Presentation - Week 12

Case Study Scenario: You are the recently appointed head of a security team responsible for protecting the information holdings of Innovations IT which is a consulting agency for IT based technologies comprising of 1500 staffs. The organization locates in the central business district of the city. The security team is responsible for administering the security of information from deliberate and accidental threats. The recent information security management team found that the security has not been properly addressed in some key areas such as incident response, disaster recovery, business continuity, social engineering attacks and lack of personnel awareness of the various threats to information, and poor password security. The above issues identified needed urgent remedy. Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team. As the head of the team, it becomes your responsibility to ask your team to analyze the possible threats and provide a report on the detailed security countermeasures for all the possible threats.

As a part of the security analysis, the tasks of the team are to:

a) Identify and describe the organizational holdings (assets) at risk
b) Identify and describe the potential security threats to the organization
c) Design the necessary security counter-measures to manage and address the threats
d) Develop a comprehensive information security training and awareness program for the users of the organization belonging to the different levels of the organizational hierarchy

Assessment 3

Purpose: The purpose of the final examination is to test student understanding of all topics covered in this subject. This assessment contributes specifically to learning outcomes a, b, c, and d.

Topic: The examination may cover content from any part of the subject.

Task Details: Students will be expected to answer written response questions

Late Penalties and Extensions

An important part of business life and key to achieving KOI's graduate outcome of Professional Skills is the ability to manage workloads and meet deadlines. Consequently, any assessment items such as in-class quizzes and assignments missed or submitted after the due date/time will attract a penalty (see below).

Students who miss mid-trimester tests and final exams without a valid and accepted reason (see below) may not be granted a deferred exam and will be awarded 0 marks for assessment item. These penalties are designed to encourage students to develop good time management practices, and create equity for all students.

Attachment:- Cyber Security.rar

Reference no: EM132490507

Questions Cloud

What is the cash flow from operating activities : What is the cash flow from operating activities? Which company will report the lowest amount of cash flow from operating activities on the 2020 statement ?
Construct a framework for care of your staff : After reviewing our three nursing theorists presented this week in chapters 29, 30, and 31. Let's reflect upon the events that are taking place in healthcare.
Make the journal entry to record the redemption : Make the journal entry to record the redemption. Assume that on July 1, 2019, Concord Co. redeems half of the bonds at a cost of $1,126,600 plus
What is best estimate of the after-tax cost of debt : What is best Estimate of the after-tax cost of debt? Assume that you have been hired as a consultant by CGT, a major producer of chemicals and plastics
ICT 205 Cyber Security Assignment : ICT 205 Cyber Security Assignment help and solution, Kings Own Institute - assessment writing service - Analyse and evaluate the organisational adoption
What is the final temperature of the air : What is the final temperature of the air? What is the final volume of the air? What is the final volume of the air? What is the final pressure of the air?
Discuss the impact on the health care delivery system : Research public health issues on the "Climate Change" or "Topics and Issues" pages of the American Public Health Association (APHA) website. Investigate a.
What constant rate is the stock expected to grow : At what constant rate is the stock expected to grow after Year 3? Round your answer to two decimal places. Do not round your intermediate calculations.
Find the resulting current : Three 12 O resistors are connected in parallel and then connected to a 6.0 V battery. Find the resulting current.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP

  Describe the challenges and opportunities IT professionals

Need a paper done for IT - Describe the challenges and opportunities IT professionals in your chosen sub-disciplines might experience.

  Cryptosystem

Block cipher, Primitive root, Confusion, Diffusion, Digital signature, Conventional Symmetric-Key Encryption

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  Re-design the companys hq network

Your task is to re-design the company's HQ network and secure the Company's network infrastructure and communications.

  Determine largest allowable sender window

Assume the sqquence number space is of size k. Determine the largest allowable sender window which will avoid the happening of problems of these protocols?

  What is the main goal in a denial of service attack

What is the main goal in a Denial of Service (DoS) attack? What is the difference between a virus and a worm

  How many bits of information give the next fields

How many keys are there that correspond to a closed knight tour? You can search this information on web. How many bits of information give the next fields?

  Identify and outline the function of digital certificates

Identify and outline the function of digital certificates. Explain the concepts of encrypting data and securing e-mail transmissions.

  Appraise the individual and organizational consequences of

1.compare and contrast the mis in place in two distinctly different organizations.2.compare each organizations use of

  Methods of controlling the layout of controls

Describe at least two methods of controlling the layout of controls on a web page. Explain their differences

  Which of risks gci faces are most significant to company

What measures would you propose to senior management to try to prevent a breach of data held by GCI? Your response should include recommendations for mitigating vulnerabilities identified in part (a).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd