MN502 Overview of Network Security Assignment

Assignment Help Other Subject
Reference no: EM132632641

MN502 Overview of Network Security Assignment - Melbourne Institute of Technology, Australia

Assessment Title - Security in Networked Systems

Purpose of the assessment (with ULO Mapping) - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

a. Explain the major methodologies for secure networks and what threats they address;

b. Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description -

Royal Consulting Services (RCS) provides security consulting and services to over 500 clients across a wide range of enterprises in Australia. A new initiative at RCS is for its two offices in Sydney and Melbourne to provide internships to groups of students who are pursuing their postgraduate studies in reputed institutes in Sydney and Melbourne in the Networking and Cyber Security domains.

Student groups are required to demonstrate outstanding writing and presentation skills about their theoretical as well as practical knowledge related to information security domain. Further, groups must demonstrate excellent teamwork and collaboration skills.

To evaluate suitable candidates/groups for this prestigious internship program, RCS has advised student groups from multiple institutes to prepare a detailed report and a video demonstration of two port scanning tools. Detailed descriptions of these two tasks are given in the following sections.

Part I: Report

The report must include the following sections:

A. SQL Injection Attacks

SQL injection attacks continue to be a significant attack vector for threat actors to manipulate database servers. Use the Online and library resources to research these attacks. Based on your research

1. Explain how SQL injection attacks are carried out. Report any two SQL statements crafted by the threat actors to manipulate databases.

2. Discuss one recent attack that has been initiated by the SQL injection.

3. Identify and discuss possible defenses against SQL injection attacks.

B. Load Balancing Algorithms

Load balancing is a technology that can help to distribute work across a network. Different algorithms are used to make decision on the load balancing. These include random allocation, round-robin, weighted round-robin, round-robin DNS load balancing, and others.

1. Explain the importance of load balancing in today's networks. What benefits are achieved with load balancing from information security perspective?

2. From current literature survey, research about two load balancing algorithms (mentioned above) and discuss their working mechanism with advantages and disadvantages.

3. Do these algorithms compromise security? Provide proper justification regarding your recommendation.

C. Blockchain for the Internet of Things (IoT)

With recent developments, it is predicted that there will be 18 billion internet of things (IoT) enabled devices by 2022 having a large influence across many vertical markets. Blockchain technologies have potential to track, coordinate, carry out transactions and store information from these large number of devices, enabling the creation of applications that require no centralized cloud. Based on your research and analysis

1. Discuss IoT and their Characteristics.

2. Explain the working mechanism of Blockchain and Its advantages in comparison to centralised coordination.

3. Evaluate how Blockchain can ensure security in IoT domain.

D. Cloud Computing

Cloud computing is a pay-per-use computing model in which customers pay only for the online computing resources they need. It is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provide interaction. Based on your research and analysis

1. Discuss the importance of cloud computing in today's world. Explain four service models in the cloud computing.

2. Report one security protection for cloud computing used in an organization.

3. Compare Microsoft Azure with Amazon Web Services (AWS). Create a table that lists at least five options. Include the advantages and disadvantages of each. Which would you recommend? Why?

E. References

Must consider at least 10 current references from journal/conference papers and books. Must follow the IEEE style.

Part II: Video Demonstration (5-7 Minutes)

Most communication in TCP/IP networks involves the exchange of information between a program running on one system (known as a process) and the same, or a corresponding process, running on a remote system. TCP/IP uses numeric value as an identifier to the application and services on these systems. This value is known as the port number.

Use the library resources/ the Internet to locate two port scanner applications. Download and install each selected tool on Virtual machine (Kali Linux /Windows). As a team of four, create a 5-7 minutes video demo using Zoom application (along with presenters' video) addressing the following tasks.

1. Analyse and discuss the importance of port scanners.

2. Perform port scanning using both applications.

3. Identify and discuss the strengths and weakness of each scanner.

4. Which scanner would you recommend? Justify your recommendation.

NOTE: To complete a shared goal, both teamwork and collaboration play an important role. Therefore, for this complete task, excellent teamwork and collaboration skills must be demonstrated. The assignment should be submitted on the Moodle in two separate files: The report should be submitted as a Word file and the demonstration should be submitted as a video file. Demonstration video must include presenters' video. It must be created using Zoom app.

Reference no: EM132632641

Questions Cloud

What is the beta of stock b : Stock A has a risk-level equivalent to that of the overall market. What is the beta of stock B?
What is the expected rate of return on a stock with a beta : The risk-free rate of return is 3.5% and the market risk premium is 7.5%. What is the expected rate of return on a stock with a beta of 1.28?
What is the beta of stock-flavorful teas : The return on the market is 10% and the risk-free rate of return is 2.5%. What is the beta of this stock?
Recommend an alternative model for the evaluation : Identify the stage or stages of the program to which your colleague's selected question relates. Recommend an alternative model for the evaluation.
MN502 Overview of Network Security Assignment : MN502 Overview of Network Security Assignment Help and Solution - Melbourne Institute of Technology, Australia - Assessment Writing Service
Calculate the company days sales in receivables : Assuming 75% of sales are on credit, calculate the company's days sales in receivables. (Round to 2 decimals)
What is an example of a prepaid expense : What does 'net of allowance' mean in relation to accounts receivable? In general, how are increases in this allowance reflected on the income statement?
What is the expected return on a portfolio : What is the expected return on a portfolio which is invested 20% in stock A, 50% in stock B, and 30% in stock C?
Standard deviation of the returns on kurt adventures : The remainder of the time the economy will be at normal levels. What is the standard deviation of the returns on Kurt's Adventures, Inc. stock?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd