Identify and report network threats

Assignment Help Computer Networking
Reference no: EM132991539 , Length: word count:1600

MN502 Security in Networked Systems - Melbourne Institute of Technology

Assessment - Security in Networked Systems

c. Explain the major methodologies for secure networks and what threats they address;

d. Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description
For this assignment, student groups should demonstrate outstanding writing and presentation skills about their theoretical as well as practical knowledge related to information security domain. Further, groups must demonstrate excellent teamwork and collaboration skills.

Every group must prepare a detailed report and a video demonstration of two penetration testing tools. Detailed descriptions of these two tasks are given in the following sections.

Part I: Report

The report must include the following sections:

A. DNS-over-HTTPS (DoH)
To protect DNS, some providers are using DNS-over-HTTPS, also called DoH. As its name implies, DoH uses HTTPS instead of HTTP to send DNS queries via an encrypted HTTPS connection (Port 443) rather than sending them in cleartext (Port 53) [1].
1. Explain the working mechanism of DNS-over-HTTPS (DoH).
2. Recently, DoH has become controversial. Why? What are the advantages of DoH? What are its disadvantages?
3. Compare DoH with DNS-over-TLS (DoT)

B. Zero Trust
Understanding network segmentation involves first knowing the principle of zero trust.
1. What is zero trust? What are its advantages? What are its disadvantages?
2. Explain steps required to create a zero-trust network architecture. What technologies does it require?
3. Is it a long-term security solution? Report on its acceptance in the IT security domain.

C. Cybersecurity AI
The use of AI in cybersecurity is growing rapidly [1]. Use the Online and library resources to research the latest developments in cybersecurity AI. Based on your research
1. Discuss How does it work? What platforms are using it?
2. Report some examples of AI in cybersecurity. How is it being improved?
3. Explain technologies/techniques are used to defend against adversarial AI attacks.

D. References
Must consider at least 8 current references from journal/conference papers and books. Must follow the IEEE style.

Part II: Video Demonstration (5-7 Minutes)
Penetration testing, also called pen testing or ethical hacking, is a mechanism of testing a computer system, network, or web application to determine security vulnerabilities that an attacker could exploit. Burp Suite and OWASP Zed Attack Proxy (ZAP) are two penetration testing tools for web applications having similar features.

As a team of four, create a 5-7 minutes video demo using Zoom application (along with presenters'
video) addressing following tasks.

1. Analyse and compare features of these tools.

2. Download and install each selected tool on your personal using Virtual machine (Kali Linux /Windows). Perform and explain penetration testing against two vulnerable web applications.

3. Which tool among these two would you recommend? Justify your recommendation.

Attachment:- Security in Networked Systems.rar

Reference no: EM132991539

Questions Cloud

Wite a script for the director of product innovation : Wite a script for the Director of Product Innovation to use in privately confronting one of the vocal resistors to the longer-term sustainability initiative at
What is the definition of spiritual care : What is your definition of spiritual care? How does it differ or accord with the description given in the topic readings? Definition of spiritual care would be.
Calculate Crane direct labor rate variance : Last year, the company's direct labor payroll totaled $287,775 for 49,100 direct labor hours. Calculate Crane direct labor rate variance
How the impact to nursing practice was measured : How the impact to nursing practice or nursing education was measured. What was the impact of each on nursing program accreditation and nursing program
Identify and report network threats : Identify and report network threats, select and implement appropriate countermeasures for network security.
What is the payback period for this project : McKenna Sports Authority is getting ready to produce a new line of gold clubs by investing $1.85 million. What is the payback period for this project
Find and develop vision of the ideal health care system : Develop vision of ideal health care system.List some of the characteristics that constitute such a system. What would be the goal or goals of your ideal system?
Determine the Thompson gross profit ratio : 2021 Sales $434,000 Cost of goods sold: Inventory, January 1 71,000 Net purchases 325,000. Determine the Thompson gross profit ratio
Prepare the Resource, Events and Agents model : The department manager also handles asset maintenance and asset disposal. Prepare the Resource, Events and Agents (REA) model

Reviews

Write a Review

Computer Networking Questions & Answers

  Develop a chart giving the minimum distribution time for

consider distributing a file of f 15 gbits to n peers. the server has an upload rate of u s 30 mbps and each peer has

  Discuss the socio-technical aspects of applications

MN504 - Networked Application Management - discuss the metrics that are related to performance of such applications. For IPTV, analyse critically

  Design a detailed network in netsim

MN503 - Overview of Internetworking - Network design with configuration - Discuss a roadmap process to use internetworking architecture to support long- term

  Intercept message and generates alternative message

Computed hash value for the message. Alice is able to intercept message, and generates alternative message that has a hash value that collides with Bob's original hash value. Show.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Data communication could you give me some ideas of every

could you give me some ideas of every questions of this assignmentor can you recommend some reading materials to

  Using a microsoft windows xp vista or 7 open internet

using a microsoft windows xp vista or 7 open internet explorer. click internet options on the tools menu. examine the

  Configure routing between routers

ITC542 - Internetworking with TCP/IP - Charles Sturt University - you are required to research a range of options/methods that can be used for network designing

  Explain what is the router''s outside interface ip address

What is the router's outside interface IP address. What is the router's inside interface IP address. What is the Web site's public IP address. What is the private IP address of the backup web server

  Network activity occuring between the client and dhpc server

describe the network activity occuring between the client and DHCP Server

  Develop Network design for SolutionTech

Develop Network design for SolutionTech considering a secure perimeter and explain your design considerations? (You may use any network design software

  Computer memory hacking

Describe what hacking of memory or hacking of RAM means.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd