ICT205 Cyber Security Assignment

Assignment Help Computer Network Security
Reference no: EM132860612

ICT205 Cyber Security - Kings Own Institute

Assessment type: Practical and Written Assessment(1,200 words).

Purpose The purpose of this assignment is to assess the students' understanding on identifying the risks and vulnerabilities and apply a proper configuration on firewall. Students need to exercise operational, analytical, and critical skills in order to reduce the potential security risks involved in the given case study. Hence, students are required to analyse and evaluate the security controls. This assessment contributes to the learning outcomes a, b.

Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Harvard Anglia referencing style.

Assessment topic: Port scanning, Firewall setup, and Wireshark trace

Task details: This Assignment requires you to perform a scan on the network, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications. Also, students are required to analyse a Wireshark network trace of an NMAP Config scan.

The assignment requires 3 tools as listed below to complete the criteria of this assignment:

o Use Nmap - a vulnerability scanning protocol in Kali Linux- Prepare a short Risk Mitigation plan to identify the threats for the assets.
o Configure a few settings on the firewall for the network using Kali Linux to achieve a required level of security- The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.
o Use Wireshark to capture network traces as you run the Nmap commands, so you can explain what each nmap scan is doing to identify or extract the resulting information. You need to show how Wireshark captured different network traffic packet for open and close ports

Case Study for the Assignment: ABC private bank suffers from very low information security in terms of maturity across many elements of infosec and information assurance, including cyber resilience and application of cybersecurity good practice. There was no one dealing with information security. There was no information security policy, and no deep culture for protecting data and information security. The status of cyber protection and cyber resilience was not really in good shape at all. That was because of decades of underinvestment in architecture, cyber tooling, process, and training skills. As we are in the era where

the cyber risk and cyber threats are at an exponential level, people began to see that we truly needed to get a grip on security and privacy. Data breaches could have the bank paying compliance fines and put its reputation at risk as well, and students expect a high level of protection of their data. The true impact of the internal audits and reports was finally admitting that the bank was at risk. Some metrics supported my view that we weren't protecting the bank's intellectual property assets and personal or sensitive data particularly well. The culture of handling data was not as strong as it should be, which was especially concerning, considering that they had a number of incidents over the years, particularly phishing and network intrusion. Banks have valuable information assets that can also impact the nation because. Once the gaps and risks had been identified the other challenge was convincing our non-tech but savvy executive board that updating our infosec infrastructure, architecture, and processes was a worthy investment that would yield return on investment and real value for the future- It is highly recommended that there is a need to impose a certain level of filtering for the network to be secure so as to sustain from threats and attacks. To add restrictions on a particular network it is necessary to identify the possible threats to the organization. For example, it is necessary to identify the important services that run on the network. In order to get this done, there is a need to perform scanning on the network to identify the services and ports of the applications.
Furthermore, the firewall needs to be configured by adding rules to block and allow the services based on the requirements of the organization and the security perspectives of the network.

With respect to the given study, you need to:

o Run TCP scan will scan for TCP port like port 22, 21, 23, 445 and ensure for listening port (open) through 3-way handshake connection between the source and destination port. Analyse the ports' status. If the port is open, you should be able to capture the handshake packets in Wireshark. Analyse the packets of TCP handshaking over close ports.

o Run UDP Scan where it is sending a UDP packet to every destination port; it is a connectionless protocol. Also, the same time you need to start Wireshark to capture the corresponding sent packets and anlyse the results for both open and close ports.

o Configure the firewall based on the requirement of the case study. You may filter some service or ports or IP addresses. For example, you may block the http and allow https for better security by considering SSL certificate. You can also consider for a particular service, only a particular user or network can use that. Analyse the outcome of your configuration in Wireshark.

Assessment 2

Assessment type: Written Individual assignment (2,000 words).

Purpose: The purpose of this assessment is to demonstrate student awareness of current industry and research trends in the field of information security. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes c, d.

Attachment:- Wireshark trace.rar

Reference no: EM132860612

Questions Cloud

Do agree with bookchin assessment : Attempts to ‘green' capitalism, to make ‘ecological', Do you agree with Bookchin's assessment? Drawing on relevant studies and examples critically explain why.
Determine the path induced on the coil : Determine the path x(t), the velocity u(t), the current i(t) through the coil, the electric force on the cylinder Fe(t) and the electromotive force e(t)
Show the joint cost allocation and the total costs : Show the joint cost allocation and the total costs per each product using the following different methods: Market value at split-off method
How would design a logistics network consisting warehouse : How you would design a logistics network consisting of only one warehouse. In the discussion, include the steps you need to take in order to design the optimal
ICT205 Cyber Security Assignment : ICT205 Cyber Security Assignment Help and Solution, Kings Own Institute - Assessment Writing Service - understanding on identifying the risks
Why is it more important to focus on interests : Why is it more important to focus on interests and not positions when negotiating?
Prepare the first quarter variance analysis report : Prepare the first quarter variance analysis report showing the fixed budget, flexible budget and flexible budget variances
Describe innovations wal-mart has brought to supply chain : Describe innovations Wal-Mart has brought to Supply Chain Management. Wal-Mart is well known to be a leader in Supply Chain Management.
Explain step of the research process : Explain each step of the research process and how that step affected your understanding of the issue/event of how the pandemic affected businesses?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd