Prepare a risk mitigation report and configure

Assignment Help Other Subject
Reference no: EM132982645 , Length: word count:2000

Assessment - Practical and Written Assessment

Purpose: The purpose of this assignment is to assess the students' understanding on identifying the risks, vulnerabilities and awareness of current industry and research trends in the field of information security. Students need to exercise operational, analytical, and critical skills to reduce the potential security risks involved in the given case study. Analyse and evaluate the organizational adoption of security controls. Design solutions for concrete security problems for distributed applications. This assessment contributes to learning outcomes a, b, c, d.

Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using Harvard Anglia referencing style. (More than 5 references)

Assessment topic: Port scanning, Security Planning

Task details: This Assignment requires you to perform a scan on the network, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications.

The assignment requires 1 tool as listed below to complete the criteria of this assignment:

Use Nmap - a vulnerability scanning protocol in Kali Linux- Prepare a short Risk Mitigation plan to identify the threats for the assets.

Case Study for the Assignment: An educational institute suffers from very low information security in terms of maturity across many elements of infosec and information assurance, including cyber resilience and application of cybersecurity good practice. Data breaches could have the institute puts its reputation at risk, and students expect a high level of protection of their data. It is highly recommended that there is a need to impose a certain level of filtering for the network to be secure so as to sustain from threats and attacks. To add restrictions on a particular network it is necessary to identify the possible threats to the organization. For example, it is necessary to identify the important services that run on the network. In order to get this done, there is a need to perform scanning on the network to identify the services and ports of the applications. Furthermore, the firewall needs to be configured by adding rules to block and allow the services based on the requirements of the organization and the security perspectives of the network.

Part A: With respect to the given study, you need to:

- Run TCP scan will scan for TCP port like port 22, 21, 23, 445 and ensure for listening port (open) through 3-way handshake connection between the source and destination port. Analyse the ports' status.

- Run UDP Scan where it is sending a UDP packet to every destination port; it is a connectionless protocol.

Note: Use your computer or gateway IP address in Nmap commands!

Part B: The institute had no dedicated security team and therefore till now no security policy is in place. Recently, the governing body of this business forms a security team and makes following two goals that they would like to achieve in six months -

Assessing the current risk of the entire organization Treat the Risk as much as possible

Task I: Risk Identification

In achieving the above two goals, you will do the followings -

Find at least five assets Find at least two threats against each asset Identify vulnerabilities for the assets

Task II: Risk Assessment At the end of the risk identification process, you should have i) a prioritized list of assets and ii) a prioritized list of threats facing those assets and iii) Vulnerabilities of assets. At this point, create Threats Vulnerabilities-Assets (TVA) worksheet. Also, calculate the risk rating of each of the five triplets out of 25.

TASK III: Risk Treatment In terms of Risk Treatment, for each of the five identified risk, state what basic strategy you will take. Justify for each decision. Also, Advise all possible protection mechanism and corresponding place of application

Attachment:- Assessment cyber secruity.rar

Reference no: EM132982645

Questions Cloud

Major force in the generic pharmaceuticals industry : Why is rivalry not a major force in the generic pharmaceuticals industry? Give examples
Professional knowledge regarding working : Reflect on your own values and beliefs in relation to inclusiveness. How do you develop your own professional knowledge regarding working with children with add
Examples of recognition programs : -Discuss 3 examples of recognition programs that organizations can implement. What is the rationale for introducing the 3 recognition programs, and how can an o
Explain the factors external to any mne : Essay: Identify and explain the factors external to any MNE that in the 21st century affect the international management of human resources.
Prepare a risk mitigation report and configure : Prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications
What is the dsm : What is the DSM? Why is it important to mental health care? Please give reference
What are accountable care organizations : What are accountable care organizations? What value can they provide to the healthcare industry?
What is the experiential theory : What is the experiential theory? Why some people align with this theory.
Appropriate recruitment strategies for job position : Propose appropriate recruitment strategies for this job position (frontline manager)?

Reviews

Write a Review

Other Subject Questions & Answers

  Explain the odds-ratios for the risk of overall cancer

Explain and interpret the odds-ratios for the risk of overall cancer, Do you think the study was appropriate in reference to ethics?

  Find difference in elevation required in between edges

A vehicle is moving with a velocity v on a curved road of width b and radius of curvature R . For counteracting the centrifugal force on the vehicle, find the difference in elevation required in between the outer and inner edges of the road.

  How they will be helped to fit back into the society

High reciprocating, is a judicial system in which inmates are left alone upon completion of their term to go back to the society without a plan on how they will be helped to fit back into the society

  Respond to each paragraph without using any source

Respond to each paragraph with one paragraph without using any source from the Internet. Ecofeminism is a part of environmental ethics

  Priestly moral code than knightly-aristocratic moral code

In philosophy, why is Nietzsche more interested in the priestly moral code than the knightly-aristocratic moral code? I know that this is true, like, that Nietzche was a lot more into the priestly than the knightly-aristocratic moral code,but I'm not..

  Information about environmental justice

Proponents of environmental justice claim that racial minorities are disproportionally subjected to environmental hazards. Reflect on your views regarding environmental issues.

  Compare and contrast interest groups with political parties

Compare and contrast interest groups with political parties. Identify and explain the different direct and indirect tactics used by interest groups to influence

  What causes clark to give advice to shelby

What causes Clark to give advice to Shelby? What advice does he give her? (the wedding a novel dorothy west)

  Performing the vedic sacrifices

One could attain salvation by performing the Vedic sacrifices with all their rituals which needed the services of the priests.

  Assess issues of conflict between the players and management

Assess the issues of conflict between the players and management during the history of the sport. Analyze mistakes made in negotiations and the effect.

  What are the advantages and disadvantages of issue

What are the advantages and/or disadvantages of this issue in regard to motor development. Is this issue a more recent concern, or has it been an ongoing issue for many years. Explain.

  Compare and contrast these two depictions of women

Explain the key reasons why you believe that compositions by Tchaikovsky continue to be popular with contemporary orchestras and audiences.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd