Present a proposal to address security problems

Assignment Help Other Subject
Reference no: EM133688544

APPLIED CYBERSECURITY

Learning Outcome 1: Investigate computer security systems, and generate and present a proposal to address security problems
Learning Outcome 2: Identify and analyse security vulnerabilities and propose justifiable technical solutions and potential remedy actions based on findings
Learning Outcome 3: Compare different types of security systems on the basis of functionalities, architectures, configurations, and ethical challenges
Learning Outcome 4: Communicate cybersecurity vulnerabilities and solutions to non-technical audiences to make informed decisions

Assessment 1: Security Tools and Applications

Purpose: This assessment will help students to explore the various networks tools/commands and test all those tools/commands on the laptop/PC for better learning and understanding

Assessment topic: Exploring, Implementing, and Testing

Network Security Tools Task details:

Title: Exploring, Implementing, and Testing Network

Objective:

The objective of this assignment is to familiarize students with various network security tools, their implementation, and testing procedures to assess network vulnerabilities. Students will explore, implement, and conduct tests using different security tools to evaluate the effectiveness of these tools in safeguarding network infrastructures.

Instruction:

Tool Selection: Each student must select and explore five network security tools. The tools should encompass a range of functionalities such as network scanning, intrusion detection, firewall management, encryption, etc. Some recommended tools include but are not limited to:

  • Wireshark
  • Nmap
  • Snort
  • Metasploit
  • Nessus
  • OpenVAS
  • Firewall (specific brand or software)
  • Burp Suite
  • OpenSSL
  • Security Onion

Implementation: Students are required to implement these tools within their own systems or a simulated network environment. Ensure proper installation, configuration, and understanding of the tool's functionalities.
Testing: Once implemented, conduct tests to evaluate the effectiveness of these tools. Perform activities such as network scanning, vulnerability assessments, intrusion detection, packet analysis, etc., using the selected tools. Record observations, strengths, weaknesses, and any issues encountered during testing.

Tool Descriptions: Detailed description of each selected tool, its functionalities, and intended use.

Implementation Process: Step-by-step guide on how the tools were implemented within the system or network.
Testing Methodology: Explanation of the testing procedures conducted using each tool, including the tests performed, results obtained, and observations made.
Evaluation: Analyze the effectiveness of each tool, highlighting their strengths, weaknesses, and potential real-world applications.
Conclusion: Summary of key findings, recommendations, and overall impressions of the tools used.

Assessment 2: Purpose: This assessment will allow students to investigate vulnerabilities in cybersecurity and understand the use of various tools for vulnerabilities analysis.

Task Details:

In this assignment, the students will perform network analysis on Kali Linux VM to identify any security vulnerabilities and threats. The students will apply the knowledge gained in the course and online knowledge to perform the analysis. The discussion in the assignment should be based on the CIA (Confidentiality, Integrity and Availability) triad and defence-in-depth. The students will discuss the risk/threat (vulnerability) identified in the analysis and suggest mitigation techniques to reduce those threats. Students must submit the assessment 2 by the end of week 11.

Assessment Description

Setting Up Analysis Environment:

Step 1: You need a Kali Linux VM for this assignment. Download the kali Linux 2021 or any other available. You can also use lab PCs for this assignment.
Students can download the Kali Linux for Virtual box from the following link:
Get Kali | Kali Linux

Step 2: The students also need a target VM with vulnerabilities. This can be done in a few ways.
By installing DVWA. (GitHub - digininja/DVWA: Damn Vulnerable Web Application (DVWA)
By creating a test VM using Metasploitable2
Using other Vulnerable VM
Step 3: After downloading you will need to import each VM into VirtualBox. Students must understand, analyse and demonstrate the use of 1 network analysis tools and utilities and identify vulnerabilities related to cybersecurity.

Performing Vulnerability Analysis

You will be demonstrating the use of 1 vulnerability analysis tools and utilities of your choice such as Nmap, Nikto, OpenVAS, Aircrack etc.

The students are required to make use of tools and utilities available in Kali Linux for network analysis. In other words, you have to get insights about host, it's IP address, OS, security details such as open ports, why they are open, security auditing, compliance testing and system hardening. Your report should contain the following sections:

Introduction: A brief introduction about the analysis tools and utilities used.
Vulnerability analysis: The section should include an introduction about vulnerability analysis tools used in the assignment. You will research a bit about tools usage and demonstrator the working of these tool to analyse network and identify any potential vulnerability and security issues. You must provide screenshot of the process in your report.

Summary: The report must include a summary section in which you have to compare the information gather through all the tools you have used to analyse the network. List down advantages and limitation of each tool.

Submission requirements details: The students will submit a report of approximately 1200 words with a screenshot of the analysis performed. The report should include the following sections:

Assessment 3

Assessment - Countermeasures

Assessment purpose: In this assessment, the students will understand and apply countermeasures for the vulnerabilities identified in the Assessment 2 on Kali Linux VM. The students will apply the knowledge gained in the course and online knowledge to suggest and apply countermeasures. This assessment contributes to learning outcomes b and c.

Task details: In this assessment, Student will understand the countermeasures to protect the system from vulnerabilities identified in Assessment 2. Student will select one vulnerability from the analysis in Assessment 2 and research about approaches that can be used to protect the system.

Introduction:
A brief introduction about the selected vulnerability
Countermeasures:
Recommend methods or tools to harden the system. The student needs to provide the counter measures available for security threats encountered during scanning of host and network. Apply the countermeasure in a Virtual Lab environment successfully.
Conclusive remarks.

Note: Need Assessment 2 and 3

Reference no: EM133688544

Questions Cloud

What are significant insights into the golden age of athens : What are the three most significant insights into "The Golden Age of Athens" that the Khan Academy video entitled The Golden Age of Athens, Pericles.
Interpret simple program specifications : Develop a Python 3 program that uses ChatGPT to generate at least 20 records and five fields - Use an integrated development environment to develop, debug
What role did christianity play in this development : What role did Christianity play in this development and was it positive? Why or why not?
Why it did result in terrible resolution : If science if really for advancing humanity, why it did result in terrible resolution?
Present a proposal to address security problems : ICT740 APPLIED CYBERSECURITY, King's Own Institute - Analyze the effectiveness of each tool, highlighting their strengths, weaknesses, and potential real-world
Define the values of imperialism : In your own words, provide a definition for the term imperialism that addresses the four different arguments about the causes and values of imperialism.
Describe three importance of historical criticism : Explain at least 2 keywords about your understanding of historical criticism. How do you think that historical criticism is reflected in this documentary film?
How did idea affect the role of the school-based slp : How did IDEA affect the Role of the School-Based SLP?
Describe the cultural effects of the american political : Describe the cultural effects of the American political and economic models' spread. Insert in-text citations and references.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd