Reference no: EM132482220 , Length: word count:1700
MN502 Overview of Network Security - Melbourne Institute of Technology
Learning Outcome 1: Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems
Section A :IT Security Frameworks and Reference Architectures
The field of information security contains various supporting structures for implementing security. These structures are called industry-standard frameworks and reference architectures. There are several supporting structures available as templates for creating a secure IT environment. These include ISO, NIST, COBIT, ETSI, RFC, and ISA/IEC [1].
For this Section of the assignment, write a literature review regarding any five security frameworks/architectures by referring to reputed books, journal and conference articles. The discussion in the report must explain following points with proper in-text citations.
• How these structures are predominately used? Discuss their strengths and weaknesses
• Discuss the nature of these architectures categorically a) general b) application specific?
• Recommend the framework/architecture for small business, school, home, office on the basis of an appropriate selection criterion
Section B: Potential threats and mitigation tools for Botnet
The security remains a challenge in networked information systems. The ubiquity and increasing popularity of the cyber physical systems have made networked devices a powerful amplifying platform for cyberattacks. These attacks are mainly carried out by using malicious software (Malware). Generally, Malware are classified based on their primary traits. One of the primary traits of Malware is Payload capabilities.
"One of the most popular payload of Malware today is software that will allow the infected computer to be placed under the remote control of an attacker for the purpose of launching attacks. This infected robot computer is called a bot or zombie. When hundreds, thousands, or even millions of bot computers are gathered into a logical computer network, they create a botnet under the control of a bot herder" [1].
For this Section of the assignment, write a report including the following sections:
• Addressing the feedback provided in Section A of the assignment
• Introduction about Botnet and its impact on the society
• Discussion of any three variants of Botnet
• Botnet architecture, operation and communication
• Potential threats posed by a Botnet
• Recommendations on any two mitigation techniques/tools to tackle the Botnet attack and discuss the effectiveness of the selected tools.
• Discussion on one Networked Applications targeted/attacked by Botnet from current literature review.
M. Ciampa, Security+ Guide to Network Security Fundamentals, 6th ed. Cengage, 2018.
Assignment Instructions:
• Assignment-1 should be submitted as MS Word document.
• Do not use Wikipedia as a source or a reference
• Must consider at least eight (three for Section A and five for Section B) current references from journal/conference papers and books. Must follow IEEE referencing style.
• Make sure you properly reference any diagrams/ graphics used in the assignment.
Attachment:- Overview of Network Security.rar
Determine what are the target fixed costs
: Variable cost is $190 per unit and cannot be reduced. Assume all products produced are sold. Determine What are the target fixed costs?
|
Determine what are the target fixed costs
: Variable cost is $190 per unit and cannot be reduced. Assume all products produced are sold. Determine What are the target fixed costs?
|
Prepare record the issuance of stock for the building
: Prepare Record the issuance of stock for the building. On July 1, 2011, Kosa, a new corporation, issued 20,000 shares of its common stock
|
Calculate the net benefit under each alternative
: Calculate the net benefit under each alternative. NaturalMaid processes organic milk into plain yogurt. NaturalMaid sells plain yogurt to hospitals
|
IT Security Structures and Botnet Assignment
: IT Security Structures and Botnet Assignment help and solution - Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in network
|
Prepare and journalize each transaction
: Prepare and Journalize each transaction. Explanations are not required. ?(Record debits? first, then credits. Exclude explanations from journal? entries.)
|
Prepare ivanhoe adjusting entry on wednesday
: Prepare Ivanhoe's adjusting entry on Wednesday, December 31, and the journal entry to record the $10,790 cash payment on Friday, January 2.
|
How are the assets and liabilities of blair reported
: Discuss items have been identified for an acquiree company. Which one(s) are separately capitalized by the acquiring company, per FASB ASC 805?
|
How the economy would naturally adjust back to equilibrium
: Would we expect to witness an observed unemployment rate higher or lower than the natural unemployment rate following this shock? Briefly discuss why.
|