IT Security Structures and Botnet Assignment

Assignment Help Other Subject
Reference no: EM132482220 , Length: word count:1700

MN502 Overview of Network Security - Melbourne Institute of Technology

Learning Outcome 1: Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems

Section A :IT Security Frameworks and Reference Architectures

The field of information security contains various supporting structures for implementing security. These structures are called industry-standard frameworks and reference architectures. There are several supporting structures available as templates for creating a secure IT environment. These include ISO, NIST, COBIT, ETSI, RFC, and ISA/IEC [1].

For this Section of the assignment, write a literature review regarding any five security frameworks/architectures by referring to reputed books, journal and conference articles. The discussion in the report must explain following points with proper in-text citations.

• How these structures are predominately used? Discuss their strengths and weaknesses
• Discuss the nature of these architectures categorically a) general b) application specific?
• Recommend the framework/architecture for small business, school, home, office on the basis of an appropriate selection criterion

Section B: Potential threats and mitigation tools for Botnet
The security remains a challenge in networked information systems. The ubiquity and increasing popularity of the cyber physical systems have made networked devices a powerful amplifying platform for cyberattacks. These attacks are mainly carried out by using malicious software (Malware). Generally, Malware are classified based on their primary traits. One of the primary traits of Malware is Payload capabilities.

"One of the most popular payload of Malware today is software that will allow the infected computer to be placed under the remote control of an attacker for the purpose of launching attacks. This infected robot computer is called a bot or zombie. When hundreds, thousands, or even millions of bot computers are gathered into a logical computer network, they create a botnet under the control of a bot herder" [1].

For this Section of the assignment, write a report including the following sections:

• Addressing the feedback provided in Section A of the assignment
• Introduction about Botnet and its impact on the society
• Discussion of any three variants of Botnet
• Botnet architecture, operation and communication
• Potential threats posed by a Botnet
• Recommendations on any two mitigation techniques/tools to tackle the Botnet attack and discuss the effectiveness of the selected tools.
• Discussion on one Networked Applications targeted/attacked by Botnet from current literature review.

M. Ciampa, Security+ Guide to Network Security Fundamentals, 6th ed. Cengage, 2018.

Assignment Instructions:

• Assignment-1 should be submitted as MS Word document.
• Do not use Wikipedia as a source or a reference
• Must consider at least eight (three for Section A and five for Section B) current references from journal/conference papers and books. Must follow IEEE referencing style.
• Make sure you properly reference any diagrams/ graphics used in the assignment.

Attachment:- Overview of Network Security.rar

Reference no: EM132482220

Questions Cloud

Determine what are the target fixed costs : Variable cost is $190 per unit and cannot be reduced. Assume all products produced are sold. Determine What are the target fixed costs?
Determine what are the target fixed costs : Variable cost is $190 per unit and cannot be reduced. Assume all products produced are sold. Determine What are the target fixed costs?
Prepare record the issuance of stock for the building : Prepare Record the issuance of stock for the building. On July 1, 2011, Kosa, a new corporation, issued 20,000 shares of its common stock
Calculate the net benefit under each alternative : Calculate the net benefit under each alternative. NaturalMaid processes organic milk into plain yogurt. NaturalMaid sells plain yogurt to hospitals
IT Security Structures and Botnet Assignment : IT Security Structures and Botnet Assignment help and solution - Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in network
Prepare and journalize each transaction : Prepare and Journalize each transaction. Explanations are not required. ?(Record debits? first, then credits. Exclude explanations from journal? entries.)
Prepare ivanhoe adjusting entry on wednesday : Prepare Ivanhoe's adjusting entry on Wednesday, December 31, and the journal entry to record the $10,790 cash payment on Friday, January 2.
How are the assets and liabilities of blair reported : Discuss items have been identified for an acquiree company. Which one(s) are separately capitalized by the acquiring company, per FASB ASC 805?
How the economy would naturally adjust back to equilibrium : Would we expect to witness an observed unemployment rate higher or lower than the natural unemployment rate following this shock? Briefly discuss why.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd