Identify network threats using network security tools

Assignment Help Other Subject
Reference no: EM132121120

Network Security Assessment - Identify Network Threats using Network Security Tools

Purpose of the assessment - The objective of this assignment is to identify network threats using network security tools. The purpose of the assignment as per Unit Learning Outcomes:

  • Explain the major methodologies for secure networks and the threats they address.
  • Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description -

Network security is a process to secure the computer network system from all sorts of security threats, including threats to the physical set up. In this assignment, your task is to identify and evaluate network security threats that relate to network monitoring. You may, for example, investigate the network in the Institute, at your home or of the Internet by using any network security tool.

Use any TWO open source network monitoring and analysis tool mentioned below:

  • GFI LanGuard
  • PRTG
  • Nmap
  • Metasploit
  • TCPdump
  • Open VAS

After scanning the network, compare and discus results on the threats these tools could be used for network monitoring and analysis. Also provide appropriate mitigation and countermeasure strategies for the identified threats and vulnerabilities.

Section to be included in the report -

Introduction - Appropriately select a tool and discuss how it detects and exploit network vulnerabilities.

Literature Review - Related to your topic, discuss major methodologies related to network security threats and attacks.

Network Security Tools - Discuss how you identify and analyse network security threats. Provide detailed description of all threats with appropriate screenshots.

Threat Mitigation Techniques - Discuss in detail mitigation techniques for the selected vulnerabilities in your report.

Conclusion - Summarize your findings in report with valid comments.

Reference style - Appropriate IEEE referencing style and report presentation.

Verified Expert

The paper is prepared for Identification of Network Threats using Network Security Tools. NMAP and Open VAs are selected for the report and it is prepared for 1293 words excluding reference, bilbliography, title papge and table of content. The paper explains the major methodologies for secure networks and the threats they address. It identifies and report network threats, select and implement appropriate countermeasures for network security Font used: Calibiri, 11 pt, references are in IEEE format.

Reference no: EM132121120

Questions Cloud

Can studentid have a null value : Member(StudentId, OrganizationId, RoleId) stores the membership information of student joining organization.
Type of data help healthcare organizations : how does this type of data help healthcare organizations (both clinical and management) with their operations and quality initiatives
What network device or devices can be used to address : In relation to Internet connectivity, both you and the chemists at Plains Research are concerned about security.
Create for three separate triangles : Create (construct instances) for three separate triangles (tr1, tr2, tr3) and assign positive values to leg1 and leg2 for each tringle.
Identify network threats using network security tools : BN203 Network Security Assessment - Identify Network Threats using Network Security Tools, Melbourne Institute of Technology, Australia
Identify organisational information requirements : MN405 - Data model development and implementation - Model organisational information requirements using conceptual data modelling techniques
Explain how you expect this phase to impact : Discuss any "ah-hah" or breakthrough moments you experienced during this phase of the project.
Why sometime there are two recursion trees shown : Why sometime there are 2 recursion trees shown. why sometimes the work per level decreases from level to level, and it is constant in each level.
Write a solution to the red or blue computation : In the first half step of an iteration, any red color can move right one cell if the cell to the right is unoccupied (white);

Reviews

inf2121120

11/30/2018 10:37:30 PM

I have always received a satisfactory paper whenever your team has done asisgnments for me regardless of the deadlines rather short or long. A heartly felt thanks to the whole team of ExpertsMind from my side as they keep helping all the studenst from all around the world.

len2121120

9/24/2018 4:53:51 AM

Word limit 1000 – 1500. Submission Guidelines - All work must be submitted on Moodle by the due date along with a title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2121120

9/24/2018 4:53:45 AM

Submission Guidelines - Your report should include and discuss all the results in detail with appropriate screenshots. Report should investigate and show originality of work, and be different from others. Reference style - Appropriate IEEE referencing style and report presentation.

len2121120

9/24/2018 4:53:39 AM

Marking Rubric: Total Marks 50 - Introduction 3 marks - All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Literature Review 10 marks -Finding is clearly linked and well justified. Network Security Tools 20 marks -Exceptional discussion on security threats for the system with appropriate tools. Identifying highly sophisticated and well referenced vulnerabilities. Threat Mitigation Techniques 10 marks -Advance discussion on threats mitigation using latest technologies and procedures. Conclusion 2 marks - A very powerful conclusion with full confidence. Reference style 5 marks -Clear styles with excellent source of references.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd