ICT 205 CYBER SECURITY Assignment

Assignment Help Computer Network Security
Reference no: EM132710451 , Length: word count:1000

ICT 205 CYBER SECURITY - KING’S OWN INSTITUTE

Assessment

Assessment type: Practical and Written Assessment, Individual assignment (1,000 words).

Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. Analyse and evaluate the organizational adoption of security controls.

Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes a, b.

Submission requirements details: All work must be submitted on Moodle by the due date.
Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Harvard Anglia referencing style.

Assessment topic: Firewall Setup and Configuration

Task details: This Assignment requires you to perform a scan on the network, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications.

The assignment should be completed in two parts:

Part A: Use Nmap - a vulnerability scanning protocol in Kali Linux. Prepare a short Risk Mitigation plan to identify the threats for the assets.

Part B: Configure a few settings on the firewall for the network using Kali Linux to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.

Case Study for the Assignment: Brunel University's infosec needs were originally very low in terms of maturity across many elements of infosec and information assurance, including cyber resilience and application of cybersecurity good practice. There was no one dealing with information security. There was no information security policy, and no deep culture for protecting data and information security. The status of cyber protection and cyber resilience was not really in good shape at all. That was because of decades of underinvestment in architecture, cyber tooling, process, and training skills.

As we are in the era where the cyber risk and cyber threats are at an exponential level, people began to see that we truly needed to get a grip on security and privacy. Data breaches could have the university paying compliance fines and put its reputation at risk as well, and students expect a high level of protection of their data The true impact of the internal audits and reports was finally admitting that the university was at risk. Some metrics supported my view that we weren't protecting the university intellectual property assets and personal or sensitive data particularly well.

The culture of handling data was not as strong as it should be, which was especially concerning, considering that they had a number of incidents over the years, particularly phishing and network intrusion. Universities have valuable information assets that can also impact the nation because of our tremendous amounts of high-end research, intellectual property, patents, and personal data. Once the gaps and risks had been identified the other challenge was: convincing our non-tech but savvy executive board that updating our infosec infrastructure, architecture, and processes was a worthy investment that would yield return on investment and real value for the future.

It is highly recommended that there is a need to impose a certain level of filtering for the network to be secure so as to sustain from threats and attacks. To add restrictions on a particular network it is necessary to identify the possible threats to the organization. For example, it is necessary to identify the important services that run on the network. In order to get this done, there is a need to perform scanning on the network to identify the services and ports of the applications. Furthermore, the firewall needs to be configured by adding rules to block and allow the services based on the requirements of the organization and the security perspectives of the network.

The assignment requires you to do the following:

1. Scanning network services using Nmap application tool from Kali Linux platform in Virtual Box. Run a set of scan commands (from the Nmap cheat sheet) and discuss how the results obtained from Nmap in terms of the services running on the network and other attributes provided in the result. The discussion of results should be supported with screenshots.

2. Write a short summary of the possible threats that can be experienced by the network to setup the firewall configuration accordingly.
3. Configure or set up firewall rules for the network using the UFW of the Kali Linux platform Configure the following setting on the firewall using the appropriate commands in Kali Linux.
1. Check the status of the firewall
2. Enable/Disable firewall accordingly
3. Allow services such as TCP, SSH suing the name of the service or the port numbers
4. Verify the firewall rules after adding the above services
5. Secure a web server by blocking HTTP service allowing HTTPS service only
6. Allow the ports 20 and 21
7. Block the ports 400 and 423
8. Verify the firewall rules
9. Block the network connections originating from a specific address
10. Allow the port to transfer files from one computer to another
11. Allow MySQL connections from a specific IP address or subnet

Submission requirements details: Report submission Week 6; Demonstration Week 7. All work must be submitted on Moodle by the due date. Reference sources must be cited and listed appropriately at the end in a reference list using Harvard Anglia referencing style.

Attachment:- CYBER SECURITY.rar

Reference no: EM132710451

Questions Cloud

Define the term divergence in tourism and leisure : "The organization and structure of each of tourism, hospitality and leisure is demonstrably different in different parts of the world according to national.
Develop a security plan and security policy : Perform a risk assessment to determine what level of security is needed to protect your information assets and Develop a security plan and security policy
What are the major factors influencing pay : What are the major factors influencing pay? What sort of advice would you give to someone whose goal is to earn a great deal of Money?
How does the level of change in gross domestic product : How does the level of change in gross domestic product (indicator of country economic health) influence a firm's strategy? The response must be typed.
ICT 205 CYBER SECURITY Assignment : ICT 205 CYBER SECURITY Assignment Help and Solution, KING’S OWN INSTITUTE - Assessment Writing Service - Write a short summary of the possible threats
What is hrm in term of recruiting policy : What is human resource management in term of recruiting policy conflict with frictional unemployment? Note explain with examples. The response must be typed.
What are the steps involved in such an integration : What are the organizational advantages of integrating strategic management and human resources management? What are the steps involved in such an integration?
Explain the important strategy that cannot be ignored : Preventing highly valuable employees from leaving is an important strategy that cannot be ignored. It is not only the cost of losing these employees.
PCD101 Place, Culture & Destination Management Assignment : PCD101 Place, Culture & Destination Management Assignment Help and Solution, Laureate International Universities - Assessment Writing Service

Reviews

Write a Review

Computer Network Security Questions & Answers

  Case study on attacking more than just the enterprise

Question 1: Evaluate the recent trend toward attacking small and medium businesses and identify the benefits that these types of businesses have which attract attackers. Question 2: Compare and contrast the digital forensic operations of small-siz..

  Discuss why it is so important for all application builders

Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web applications, before using that data

  Ip spoofing

honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer

  Write the different techniques use in detecting intrusion

Explain in detail about system security and write down the different techniques use in detecting intrusion. Explain the answer must be accompanied by algorithm.

  Hypothetical business engaged in e-business

Provide an executive briefing to middle and upper management on the topic of cryptography and how it should be applied in this environment

  Explain ten security policies procedures and technologies

Using bullet points, briefly explain ten security policies, procedures, and/or technologies you would put into place during your first year on the job.

  Summarize how virtualization works

Summarize how virtualization works, what it can be used for, what the security flaws are, and why the security issues associated withvirtualization might be of concern.

  Hash values in the context of digital forensics

Provide a list of people you believe should be interviewed for this investigation and how they relate to the investigation - Provide a narrative description

  Discuss the current it cybersecurity policy

Current policy: Discuss the current (as per the case study) IT cybersecurity policy of DaimlerChrysler

  Write a summary of learning team collaborative discussion

Write a 350-word summary of the Learning Team Collaborative Discussion including your own personal views on ethics and privacy as they relate to information security.

  What challenges are there with cloud computing

What challenges are there with cloud computing? Why is the Internet often considered the cause of cyber security issues?

  Develop an application that can hack drones

Develop an application that can hack drones - Contextual literature review that support the topic

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd