Implement the honeypot in a virtual environment

Assignment Help Computer Networking
Reference no: EM132107878

Learning objectives - Apply software tools to troubleshoot common network security problems.

This lab activity requires you to identify and deploy a suitable honeypot to suite the following scenario. An organisation has been the target of recurring network intrusion attempts targeted at their public facing services. To mitigate the risks and better understand the threat, the organisation has decided to deploy honeypots as one of the options.

The following network design (Figure 1) shows three honeypot deployments for the organisation. Your task is to select one honeypot, identify a suitable tool to deploy the honeypot, and provide a detailed guide of how to deploy and customise the honeypot.

395_figure.jpg

FIGURE 1: HONEYPOT DEPLOYMENT DESIGN

Task

a) Choose a honeypot you want to deploy.

b) Identify a suitable tool to deploy the honeypot you have chosen.

c) Implement the honeypot in a virtual environment (you may use vmware, virtualbox, docker, or any other virtual environment of your choice).

d) Provide a detailed guide for the honeypot deployment with step-by-step instructions. Each step should have screenshots of your implementation as proof.

e) Test the honeypot deployment. This can be done through activity logged or displayed by the honeypot deployed. You will need to show that you have interacted with the honeypot in some way, and that the honeypot has detected or recorded this activity.

f) Provide a technical report proposing your solution, including the following
i. Choice of honeypot
ii. Deployment guide
iii. Test procedure and evidence

Reference no: EM132107878

Questions Cloud

Decline in interest coverage ratio of a firm : What could be the reason for a decline in interest coverage ratio of a firm?
Undervalued-overvalued stock : A manager believes his firm will earn a 7.9% return next year. His firm has a beta of 1.69, they expect a return on the market is 15.9%, and the risk-free rate
What is the terminal value on an initial investment : What is the terminal value on an initial investment of 250 if the investor is seeking a 17% yield to maturity after 3 years?
What price should you be willing to pay for the stock : If the required return is 8%, what price should you be willing to pay for the stock?
Implement the honeypot in a virtual environment : CSI6116 Network Security - Edith Cowan University - Implement the honeypot in a virtual environment (you may use vmware, virtualbox, docker
What is the yield to maturity : What interest rate on an investment would turn 120 into 172.8 over two years? What is the yield to maturity? What is the proportional rate over three months?
Two options work out at the same cost : At what interest rate would these two options work out at the same cost?
Amount to include in the budget request for project : What is the correct amount to include in the budget request for this project?
What is the fair present value of the stock : What is the fair present value of the stock if the required rate of return is 13%?

Reviews

len2107878

9/8/2018 5:29:34 AM

Testing of honeypot No Attempt / Does not meet requirements (0) Some testing procedures and/or some outputs provided (1-2) Testing procedures and corresponding outputs provided (3) ? out of 3 Total ? out of 10 Additional Feedback: * Please note that if you fail to meet the minimum performance for a given success criteria, you will be awarded a zero (0) under the “Low Performance” performance indicator.

len2107878

9/8/2018 4:45:29 AM

4 Marking Criteria The following is the marking criteria used for this assessment. Any additional feedback will be provided in the space provided below. Success Criteria Performance Indicators Low Performance* Meet Expectations Meet Expectations + Exceptional Marks obtained Identification of a suitable tool for the honeypot deployment No Attempt / Does not meet requirements (0) Tool identified is suitable for the honeypot chosen (2) N/A ? out of 2 Deployment of the honeypot No Attempt / Does not meet requirements (0) Step-by-step instructions provided with screenshots sufficiently (1-3) Detailed instructions provided (4-5) ? out of 5

Write a Review

Computer Networking Questions & Answers

  Learn as much as possible about that ip address

Using tools that are freely available in the Web, learn as much as possible about that IP address (Domain name, owner, physical location, address, etc.)

  How can i get the real local host ip address in an applet

What's a Malformed URL Exception? What is TCP and how does it work? How can I get the real local host IP address in an applet?

  What is the bit size of the port address in a udp header

What is the maximum size of an IPv4 header? What is bit size of the port address in a UDP header? What is default mask for a class A address in CIDR notation?

  Discussion-the internet of everything

Britney and Madonna are perceived as 'old school' by newer tech rock stars. However, they have teamed up to work on a new process.

  Make assumptions where appropriate

You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

  What is the total efficiency of the protocol

What would the value of the field containing the parity bits be for the case of a two-dimensional parity scheme? Your answer should be such that a minimum-length checksum field is used.

  Create communication system for transmission

Create communication system (block diagram) which will permit transmission of these 4 sources over  telephone channel using: Time division multiplexing by using PCM, suppose 8-bit samples.

  What kind of powers does president have which permit him or

address the following in 1000-1.250 words what type of powers does the president have that allow him or her to create

  Design a solution to this problem using private vlans

You have a fifth webserver that is serving a web application and therefore it requires access to the database server. This webserver and the database server should ONLY be able to communicate with each other and the gateway.

  Recognize at least five 5 it-related laws and regulations

countries have imposed international laws in their own ways based around many factors. such factors include social

  Administering active directory users and groups

ITSA1001 - Record all configuration updates you have made to the server during this practical task - ADMINISTERING ACTIVE DIRECTORY USERS and GROUPS

  Test if the system operates in the production environment

This section specifies the plans for producing updates to this software testing plan document itself and the methods for distribution of updates along with version control and configuration management requirements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd