Perform the cybersecurity attacks

Assignment Help Other Subject
Reference no: EM132486916 , Length: word count:2000

SIT182 - Real World Practices for Cyber Security - Deakin University

Cybersecurity Scenario: A research and development company called ‘NETsec' is a defense contractor providing hardware and software solutions for the federal government. They want to ensure their web system is appropriately secured and protected from potential cybersecurity attacks. This is of upmost importance for maintaining an exemplary reputation and business relationships with their client. The CIA of cybersecurity is critical to maintaining the information and infrastructure of NETsec. A successful breach of their system or leak of a product design could result in the collapse of the company.

To ensure this does not happen NETsec has requested the services of your team to apply the necessary knowledge and skills to identify any security vulnerabilities, attempt to infiltrate their system by performing an attack(s) and providing appropriate recommendations so countermeasures can be applied.

Report

Each group is to work as a team and submit a report of approximately 2000 words and exhibits following the Teamwork Rubric provided. The report MUST include descriptions and evidence of results of the steps performed in order to be eligible to be awarded maximum marks for each rubric criterion.

Your team is required to perform the following cybersecurity attacks in an attempt to subvert the security of the NETsec Web system and ultimately gain access to the restricted administration page of the website

Perform a bruteforce password attack; Perform a privilege escalation attack; Perform a social engineering attack.

Attachment:- Real World Practices for Cyber Security.rar

Reference no: EM132486916

Questions Cloud

Prepare in good form a cash budget for March : In January, sales were $39,000 and February sales were $43,000.Projected sales for March are 4,000 gizmos at $9 each. Prepare a cash budget for March
List the b-cell developmental stages : List the B-cell developmental stages from pre-pro to immature B cells describing B-cell receptor (BCR or Ig) rearrangements occurring
What do think of parkers idea to outsource : What do you think of Parker's idea to outsource the manufacturing of the King? should Boone stick with mass production or try something else? Explain.
Replacement for severe degenerative joint disease : With tha diagnosis in mind, which of the following is most likely in the above patient?
Perform the cybersecurity attacks : Perform the cybersecurity attacks in an attempt to subvert the security of the NETsec Web system and ultimately gain access to the restricted administration
Should automatically be suspicious of honesty and how : If someone is known to have been dishonest about one thing, should we automatically be suspicious of his or her honesty regarding other things?
What is martin gardner argument for the objectivist : Explain Locke's view of human nature. Use details from the textbook to support your description. Explain Hobbes's view of human nature
Explanation for person achondroplasia allele : Most people who have the achondroplasia allele did not inherit this allele from their parents. For a person who has the achondroplasia allele
Determine the percentage increase of annual profits : Determine the percentage increase of annual profits if Ventana Inc. increases its selling price by 25% and all other factors (including demand) remain constant

Reviews

Write a Review

Other Subject Questions & Answers

  Describe the theory and your rationale for selecting theory

Identify a theory that can be used to support your proposed solution

  What are best practice gold standard principles

REVIEW the article Module 1: What Are Best Practice Gold Standard Principles? hosted by Unite for Sight. Apply strategies to identify current best practices.

  Describe a variety of helping strategies for reducing effect

Describe a variety of helping strategies for reducing the negative effects of substance abuse and dependency.

  Explain a psychosocial intervention of psychosocial factors

Identify and explain a psychosocial intervention that addresses one of the four specific psychosocial factors you described above.

  How can common law torts be used in environmental law

How can common law torts be used in environmental law?

  Why is it necessary to ask patients with migraine

Why is it necessary to ask patients with migraine if they have any tingling or numbness anywhere?

  Determine valuable from a marketing perspective

Determine which would be more valuable from a marketing perspective.How does a personal decision differ from an organization's buying decision process?

  What is meant by sensitivity of a dependent variable

What are the advantages and disadvantages of posttest only design and pretest-posttest design? What is meant by sensitivity of a dependent variable

  Case study-observation-quasi experimental

Identify which research design is used in the study (correlation, survey, case study, observation, quasi-experimental, or experimental or other). Explain why you think that model was used.

  Irregular warfare poses to the use of airpower

What are the greatest challenges that asymmetric/irregular warfare poses to the use of airpower? Identify at least 2 issues from past or present conflicts.

  What are the more common reasons for workplace violence

What are the more common reasons for workplace violence? What obligation does a health care facility have to protect workers from violence?

  Discusses the role of political scientists

Discusses the role of political scientists and their attempts to treat the study of politics as a science.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd