Reference no: EM132518632 , Length: word count:2500
ITC358 IT Security - Charles Sturt University
Learning outcome 1: be able to explain fundamental information security concepts;
Learning outcome 2: be able to discuss and debate some of the security implications of computer networks, including cryptography;
Learning outcome 3: be able to compare and contrast firewall technologies;
Learning outcome 4: be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;
Learning outcome 5:be able to evaluate some of the key application security concepts and practices;
Learning outcome 6: be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.
Assessment item - Essay questions and hands-on task
A. Essay Questions
Write minimum 600 words for each of the following two short-essay questions. Both the questions are of equal value (25 marks each). You should provide credible references for each Problem according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per Problem will be appropriate.
Problem 1
Research the issue of insider threat in the context of information security and report your findings. Your report should include the following details: what insider threat means, what motivates it, types of threats involved and how to counter it.
Problem 2
Explain with a suitable example, how the Diffie-Hellman key agreement can be used for key negotiation, where more than two participants are involved. Can an attacker who captures the exchanged keying information compute the symmetric session key?
B. Hands-on Task
Port scanners usually generate lists of open, closed, and filtered ports for each scanned IP address and the information is used to identify network vulnerabilities.
In this task, you will run a simple port scan on your computer using the 'Port Scanner' produced by SolarWind. To complete this task, please follow the instructions given below.
Step 1. Download 'Port Scanner'
Step 2. Run portscanner.exe
Step 3. Under 'Scan Configuration', use your IP address in the 'Hostname and IP Address Ranges' box.
Step 4. Complete/select the remaining configurations for 'Port Ranges', 'Protocol' etc. Step 5. Now take a screenshot of your 'Scan Configuration'.
Step 6. Click on the 'SCAN' button to start scanning.
Step 7. Take a screenshot once the scan is complete.
Step 8. Using the 'SAVE RESULTS' tab, save the scan results in a .csv file. Take a screenshot of this scan report.
Assessment item - Research Report
TASK
Research the security and privacy issues associated with IoT, in the context of cybersecurity and write a report documenting your findings. Your report should include the following:
- Introduction
- Background
- Security and privacy concerns associated with IoT
- Strategies for addressing the concerns
- Conclusions and future trends
RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to explain fundamental information security concepts.
• be able to discuss and debate some of the security implications of computer networks, including cryptography.
• be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms.
• be able to evaluate some of the key application security concepts and practices.
• be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.
Attachment:- IT Security.rar