Identify and report network threats

Assignment Help Computer Networking
Reference no: EM132991539 , Length: word count:1600

MN502 Security in Networked Systems - Melbourne Institute of Technology

Assessment - Security in Networked Systems

c. Explain the major methodologies for secure networks and what threats they address;

d. Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description
For this assignment, student groups should demonstrate outstanding writing and presentation skills about their theoretical as well as practical knowledge related to information security domain. Further, groups must demonstrate excellent teamwork and collaboration skills.

Every group must prepare a detailed report and a video demonstration of two penetration testing tools. Detailed descriptions of these two tasks are given in the following sections.

Part I: Report

The report must include the following sections:

A. DNS-over-HTTPS (DoH)
To protect DNS, some providers are using DNS-over-HTTPS, also called DoH. As its name implies, DoH uses HTTPS instead of HTTP to send DNS queries via an encrypted HTTPS connection (Port 443) rather than sending them in cleartext (Port 53) [1].
1. Explain the working mechanism of DNS-over-HTTPS (DoH).
2. Recently, DoH has become controversial. Why? What are the advantages of DoH? What are its disadvantages?
3. Compare DoH with DNS-over-TLS (DoT)

B. Zero Trust
Understanding network segmentation involves first knowing the principle of zero trust.
1. What is zero trust? What are its advantages? What are its disadvantages?
2. Explain steps required to create a zero-trust network architecture. What technologies does it require?
3. Is it a long-term security solution? Report on its acceptance in the IT security domain.

C. Cybersecurity AI
The use of AI in cybersecurity is growing rapidly [1]. Use the Online and library resources to research the latest developments in cybersecurity AI. Based on your research
1. Discuss How does it work? What platforms are using it?
2. Report some examples of AI in cybersecurity. How is it being improved?
3. Explain technologies/techniques are used to defend against adversarial AI attacks.

D. References
Must consider at least 8 current references from journal/conference papers and books. Must follow the IEEE style.

Part II: Video Demonstration (5-7 Minutes)
Penetration testing, also called pen testing or ethical hacking, is a mechanism of testing a computer system, network, or web application to determine security vulnerabilities that an attacker could exploit. Burp Suite and OWASP Zed Attack Proxy (ZAP) are two penetration testing tools for web applications having similar features.

As a team of four, create a 5-7 minutes video demo using Zoom application (along with presenters'
video) addressing following tasks.

1. Analyse and compare features of these tools.

2. Download and install each selected tool on your personal using Virtual machine (Kali Linux /Windows). Perform and explain penetration testing against two vulnerable web applications.

3. Which tool among these two would you recommend? Justify your recommendation.

Attachment:- Security in Networked Systems.rar

Reference no: EM132991539

Questions Cloud

Wite a script for the director of product innovation : Wite a script for the Director of Product Innovation to use in privately confronting one of the vocal resistors to the longer-term sustainability initiative at
What is the definition of spiritual care : What is your definition of spiritual care? How does it differ or accord with the description given in the topic readings? Definition of spiritual care would be.
Calculate Crane direct labor rate variance : Last year, the company's direct labor payroll totaled $287,775 for 49,100 direct labor hours. Calculate Crane direct labor rate variance
How the impact to nursing practice was measured : How the impact to nursing practice or nursing education was measured. What was the impact of each on nursing program accreditation and nursing program
Identify and report network threats : Identify and report network threats, select and implement appropriate countermeasures for network security.
What is the payback period for this project : McKenna Sports Authority is getting ready to produce a new line of gold clubs by investing $1.85 million. What is the payback period for this project
Find and develop vision of the ideal health care system : Develop vision of ideal health care system.List some of the characteristics that constitute such a system. What would be the goal or goals of your ideal system?
Determine the Thompson gross profit ratio : 2021 Sales $434,000 Cost of goods sold: Inventory, January 1 71,000 Net purchases 325,000. Determine the Thompson gross profit ratio
Prepare the Resource, Events and Agents model : The department manager also handles asset maintenance and asset disposal. Prepare the Resource, Events and Agents (REA) model

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd