Reference no: EM132991539 , Length: word count:1600
MN502 Security in Networked Systems - Melbourne Institute of Technology
Assessment - Security in Networked Systems
c. Explain the major methodologies for secure networks and what threats they address;
d. Identify and report network threats, select and implement appropriate countermeasures for network security.
Assignment Description
For this assignment, student groups should demonstrate outstanding writing and presentation skills about their theoretical as well as practical knowledge related to information security domain. Further, groups must demonstrate excellent teamwork and collaboration skills.
Every group must prepare a detailed report and a video demonstration of two penetration testing tools. Detailed descriptions of these two tasks are given in the following sections.
Part I: Report
The report must include the following sections:
A. DNS-over-HTTPS (DoH)
To protect DNS, some providers are using DNS-over-HTTPS, also called DoH. As its name implies, DoH uses HTTPS instead of HTTP to send DNS queries via an encrypted HTTPS connection (Port 443) rather than sending them in cleartext (Port 53) [1].
1. Explain the working mechanism of DNS-over-HTTPS (DoH).
2. Recently, DoH has become controversial. Why? What are the advantages of DoH? What are its disadvantages?
3. Compare DoH with DNS-over-TLS (DoT)
B. Zero Trust
Understanding network segmentation involves first knowing the principle of zero trust.
1. What is zero trust? What are its advantages? What are its disadvantages?
2. Explain steps required to create a zero-trust network architecture. What technologies does it require?
3. Is it a long-term security solution? Report on its acceptance in the IT security domain.
C. Cybersecurity AI
The use of AI in cybersecurity is growing rapidly [1]. Use the Online and library resources to research the latest developments in cybersecurity AI. Based on your research
1. Discuss How does it work? What platforms are using it?
2. Report some examples of AI in cybersecurity. How is it being improved?
3. Explain technologies/techniques are used to defend against adversarial AI attacks.
D. References
Must consider at least 8 current references from journal/conference papers and books. Must follow the IEEE style.
Part II: Video Demonstration (5-7 Minutes)
Penetration testing, also called pen testing or ethical hacking, is a mechanism of testing a computer system, network, or web application to determine security vulnerabilities that an attacker could exploit. Burp Suite and OWASP Zed Attack Proxy (ZAP) are two penetration testing tools for web applications having similar features.
As a team of four, create a 5-7 minutes video demo using Zoom application (along with presenters'
video) addressing following tasks.
1. Analyse and compare features of these tools.
2. Download and install each selected tool on your personal using Virtual machine (Kali Linux /Windows). Perform and explain penetration testing against two vulnerable web applications.
3. Which tool among these two would you recommend? Justify your recommendation.
Attachment:- Security in Networked Systems.rar
Wite a script for the director of product innovation
: Wite a script for the Director of Product Innovation to use in privately confronting one of the vocal resistors to the longer-term sustainability initiative at
|
What is the definition of spiritual care
: What is your definition of spiritual care? How does it differ or accord with the description given in the topic readings? Definition of spiritual care would be.
|
Calculate Crane direct labor rate variance
: Last year, the company's direct labor payroll totaled $287,775 for 49,100 direct labor hours. Calculate Crane direct labor rate variance
|
How the impact to nursing practice was measured
: How the impact to nursing practice or nursing education was measured. What was the impact of each on nursing program accreditation and nursing program
|
Identify and report network threats
: Identify and report network threats, select and implement appropriate countermeasures for network security.
|
What is the payback period for this project
: McKenna Sports Authority is getting ready to produce a new line of gold clubs by investing $1.85 million. What is the payback period for this project
|
Find and develop vision of the ideal health care system
: Develop vision of ideal health care system.List some of the characteristics that constitute such a system. What would be the goal or goals of your ideal system?
|
Determine the Thompson gross profit ratio
: 2021 Sales $434,000 Cost of goods sold: Inventory, January 1 71,000 Net purchases 325,000. Determine the Thompson gross profit ratio
|
Prepare the Resource, Events and Agents model
: The department manager also handles asset maintenance and asset disposal. Prepare the Resource, Events and Agents (REA) model
|