Understand the principles of ethical hacking

Assignment Help Other Subject
Reference no: EM132889185

LD7010 Ethical Hacking for Cyber Security - Northumbria University

Ethical Hacking as a proactive and adversarial approach to secure systems

Learning Outcome 1: Assess computer systems, information systems and networks to identify their vulnerabilities and weaknesses.

Learning Outcome 2: Evaluate and understand the principles of ethical hacking and appreciate where and in what situations these principles should be applied

Learning Outcome 3: Critically evaluate the core concepts, knowledge and practice of computer security have developed through research

Learning Outcome 4: Appreciate the legal and ethical issues associated with ethical hacking and be able to apply them appropriately.

Requirements

For the practical part of this assignment, you will have to build three Virtual Machines (VM):
• A Linux Server
• You could use CentOS or Ubuntu Server
• Minimum configuration required
• DNS
• An additional service of your own choice (e.g. DHCP, FTP, SMTP, SNMP etc)
• A Client
• Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc)
• You could create multiple copies of the client's VM if you require more clients to demonstrate an attack
• Attacker machine
• Kali Linux (the most recent version is highly recommended)

Assignment Tasks and Deliverables
The main submission is a single individual report consisting of two parts as follows:

Part A
In this first part of the assignment, you are required to:
• Provide a summary of the configuration steps on the server and client. Include screenshots to evident functionality at the client-side. Discuss the rationale behind service selection and configuration.
• Demonstrate a minimum of 2 attacks against each of the two services configured. Any further and complex attacks will attract more marks. Log all the important and offensive events against your target including attacks detected, services' logs nature, origin of the attack and damage caused. Support your demonstration with screenshots.
• Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.

Part B
In the second part of the report, you are required to write a short position paper to critically analyse and reflect on recent state-of-the-art attacks and hacking techniques, followed by a discussion on possible countermeasures. (weights 40%)
Your paper should consider the following guidance and contain the following subtitles as a minimum:
• Title page and Abstract
• Introduction
• The nature of the brief/commission and the topic should be briefly outlined and defined alongside details of how the paper is organised.
• Scope: how did you select the attacks/techniques in this paper? E.g. most recent attacks, wireless attacks, VoIP attacks, DNS attacks etc
• Main body
• Critical discussion, reflection and analysis
• Conclusions
• A brief summary of the key findings established from your research.

• References.
• A full list of references used within the paper should be provided. The Harvard Style of referencing should be applied throughout the assignment.

Note: Need part A

Attachment:- Ethical Hacking for Cyber Security.rar

Reference no: EM132889185

Questions Cloud

Different methods of data collection for hris : Compare and contrast the different methods of data collection for HRIS, explaining the conditions under which each is most effective.
Prepare the necessary journal entries for evergreen : Prepare the necessary journal entries for Evergreen for each of the above dates. For transactions involving the sale of merchandise, ignore the entry
Explain provision of health care : Please Discuss the possible impact of recently proposed changes to the provision of health care (proposed repeal/revision of the Affordable Care Act (Obamacare)
Describe the arguments that the union : ABC Company had recently become unionized after a highly contentious organizing drive. Two employees (Bob and Jeff), who had been very active in the organizing
Understand the principles of ethical hacking : Ethical Hacking as a proactive and adversarial approach to secure systems - Evaluate and understand the principles of ethical hacking and appreciate
Why is a good relationship with union one of most important : Why is a good relationship with the union one of the most important for the HR director to maintain?
What motivated workers to participate in making the odd duck : Q1. How did the "Odd Ducks" program enrich the jobs at Standard Decoy?
Pros and cons of five sources of job candidates : What are the pros and cons of five sources of job candidates?
Is the price of futures the best estimate of exchange rates : 1. Does the shareholders equity represents the savings accompany as accumulated through the years?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd