Implement appropriate countermeasures for network security

Assignment Help Computer Networking
Reference no: EM132371789

Purpose of the assessment (with ULO Mapping)

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:
c. Explain the major methodologies for secure networks and what threats they address;
d. Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description

Zenitum Consulting Services (ZCS) provides security consulting and services to over 1000 clients across a wide range of enterprises in Australia. A new initiative at Zenitum is for its two offices in Sydney and Melbourne to provide internships to students who are pursuing their undergraduate studies in reputed institutes in Sydney and Melbourne in the Networking and Cyber Security fields. Students are required to demonstrate their theoretical as well as practical knowledge related to information security. To evaluate suitable candidates for this prestigious internship program, ZCS has asked applicants to prepare a detailed report and a presentation addressing the following sections:

A. Ransomware (maximum 700 Words)

One of the fastest evolving malware is ransomware. A ransomware continues to be a serious threat to the network users. Use library/Internet resources to explain following points in this section.

1. Introduction about ransomware and their impacts on networked systems
2. Five variants of ransomware with taxonomy
3. Potential threats posed by ransomware
4. Recommendation about one mitigation tool
5. A recent case study about ransomware attack in a networked system

B. Information Security in Healthcare Sector (maximum 700 words)
Healthcare is considered as one of the emerging application of network-based applications. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks. Based on your literature review, address following points in this section.

1. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.).
2. Recent developments in healthcare networks. Also discuss the importance of information security in healthcare network architecture.
3. Analysis of any two current or possible future security issues in Healthcare Networks.
4. A possible solution for one threat identified in point 3.
5. A recent attack related to healthcare network.

C. Compare Protocol Analysers (maximum 700 Words)
A protocol analyser is a hardware or software that captures packets to decode and analyse their contents. Network traffic can be viewed by a stand-alone protocol analyser device or a computer that runs protocol analyser software.

1. Research any two protocol analysers (such as Wireshark, Colasoft Capsa, and Microsoft message Analyser) and compare their features.
2. Download and install each selected product on your personal /lab computer using Virtual machine (Kali Linux /Windows 8.1 Professional) in Virtual Box. Perform protocol analysis (provide snapshots).
3. Which analyser would you recommend? Justify your recommendation.

D. References
Must consider at least five current references from journal/conference papers and books. Must follow IEEE Transactions on Networking style.

Note: Every group will create a 7-10 minutes presentation and present their work front of your class fellows and tutor during the Lab in Week 12.

Verified Expert

Health care information technology and possible implications of the recent threats and securities discussed. Also provided introduction of the health care network for IT and other similar applications, Also there is detailed discussion on the recent attacks and possible solutions to health care IT systems, References are provided as well.

Reference no: EM132371789

Questions Cloud

Why did you vote for your choice : The prompt shared that both positions offer the same pay, benefits, and working hours. So, why did you vote for your choice? Also, what affects, and other.
Discuss performance and deployment issues : BN208 - Networked Applications - Network Performance Analysis - Melbourne Institute of Technology - Discuss performance and deployment issues for networked
Prepare a report to evaluate the processes and risks : Holmes Institute, Australia - HA2042 Accounting Information Systems Individual Assignment - Case Study - Adam & Co. Prepare a report to evaluate the processes
What role backup policies and procedures play in protecting : Discuss what role backup policies and procedures play in protecting an organization with many different departments and their data.
Implement appropriate countermeasures for network security : BN200 - Network Security Fundamentals - Security in Networked Systems - Melbourne Institute of Technology - Explain the major methodologies for secure networks
Calculate the average treatment effect for surgery compared : Calculate the average treatment effect for surgery compared to drug? Which type of intervention is more effective on average?
Transactional vs transformational leadership : Using the Internet,read at least 2 articles each on Transactional Vs Transformational Leadership. Present discussion of what your team learned from exercise.
Question - Which one of the groups are simple : Assignment - Simple Groups, Center and Commutat-Group, Solvable Groups. Question - Which one of the groups below are simple
What is the research question and hypothesis : Assignment - Application of Multiple Regression. The data is attached in Excel format. You will need to upload it in to SPSS. What is the research question

Reviews

len2371789

9/16/2019 10:53:16 PM

Grade Mark HD 80% + Excellent Ransomware /15 A very detailed and very clear discussion An in-depth and very clear discussion Information about the Security in Information Healthcare Security in Sector /15 Healthcare networks Compare Protocol Analysers /15 A very detailed and very clear discussion References /5 Clear styles with excellent source of references. Oral Presentation /15 Good delivery, easy to follow and good interaction

len2371789

9/16/2019 10:53:09 PM

D. References Must consider at least five current references from journal/conference papers and books. Must follow IEEE Transactions on Networking style. 5 Oral Presentation Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) 15 Total Marks 65

len2371789

9/16/2019 10:53:04 PM

B. Information Security in Healthcare Sector 1. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.). 2. Recent developments in healthcare networks. Also discuss the importance of information security in healthcare network architecture. 3. Analysis of any two current or possible future security issues in Healthcare Networks. 4. A possible solution for one threat identified in point 3. 5. A recent attack related to healthcare network. 15 C. Compare Protocol Analysers 1. Research any two protocol analysers (such as Wireshark, Colasoft Capsa, and Microsoft message Analyser) and compare their features. 2. Download and install each selected product on your personal /lab computer using Virtual machine (Kali Linux /Windows 8.1 Professional) in Virtual Box. Perform protocol analysis (provide snapshots). 3. Which analyser would you recommend? Justify your recommendation. 15

len2371789

9/16/2019 10:52:58 PM

Submission Guidelines • The assignment should be submitted on the Moodle in two separate files: o The report should be submitted as a Word file o The presentation should be submitted as a PPT file • Do not use Wikipedia as a source or a reference. • Make sure you properly reference any diagram/graphics used in the assignment. Report Sections Description of the section Marks A. Ransomware 1. Introduction about ransomware and their impacts on networked systems 2. Five variants of ransomware with taxonomy 3. Potential threats posed by ransomware 4. Recommendation about one mitigation tool 5. A recent case study about ransomware attack in a networked system 15

len2371789

9/16/2019 10:52:30 PM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd