Computer Networks and Security
Need Help Writing an Essay?
Tell us about your assignment and we will find the best writer for your project.
Write My Essay For MeSecurity Fundamentals2019/20
SEC4102
Assignment-
| ASSIGNMENT TITLE | SECURITY ANALYSIS PRACTICAL |
| PARAMETERS |
| Hand in date for this assignment is 18th May 2020 closing at 16.00hrs. Release date:03/02/2020. Work submitted must be your own unless the appropriate references are quoted within the text. Particular attention is drawn to the unfair means regulations which you have access to. For example, it is not permitted to have just a bibliography of references; if you use someone else’s material provide a citation in the text for all references used. Students who fail to submit assessments by the specified date (without an extension being granted or without accepted Mitigating Circumstances) will be subject to the following penalties: See Faculty Handbook for details: https://www.bolton.ac.uk/about/governance/policies/student-policies/ Please note that it is your responsibility to ensure that the assignment is submitted in the format/s specified in the Module Guide or on the Assessment Brief. Submit your assignment work via the Moodle Turnitin system. YOU SHOULD ALWAYS ENSURE YOU KEEP A COPY OF ANY ASSIGNMENT SUBMITTED BY WHATEVER METHOD In the case of exceptional and unforeseen circumstances, an extension of up to 5 days after the assessment submission deadline may be granted by your Programme Leader. Requests for extensions for periods longer than 5 days must be made using the Mitigating Circumstances procedures. Please see your Programme Handbook for further details. |
| DELIVERABLES |
| This part of the practice involves the writing up and processing of results obtained in Laboratory Sessions done in the course. Create your security case study by choosing a specific domain/s to do your penetration testing and risk assessments and countermeasures. Make sure to take permission before starting the assignment. Passive security artefacts, accepted, in the case of facing any difficulties obtaining the permissions. Section A) Explain in detail the difference between active reconnaissance and passive reconnaissance? Select a specific domain and perform the web search, google hacking, nslookup, Traceroute, Ping, Whois, Discover, Dig, FIERCE and maltego. Critically analyse the result and draw a clear picture of the targets (to secure/hack) Provide evidence of the reconnaissance work by providing screenshots /scripts. Section B) Scanning is a set of procedures for identifying live hosts, ports, and services, discovering the Operating system and architecture of the target system, Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organisation. Scanning refers to collecting more information using sophisticated and aggressive reconnaissance techniques Use nmap, zenmap, netscan, masscan. Scapy and hping3 tools from Kali Linux to scan Metasploit Virtual machine, Critically analyse the results show the open ports the services running on different ports and highlight on the advance features in nmap. Perform another sweep scanning on a specific network using the zenmap. Draw The network Topology. Support your report and analysis with screenshots, explain the policy and procedures the organisation should implement to reduce the impact of internal and external scanning.
Install and configure Nessus scanner on any platform to complete the vulnerability scanning on a single computer and then do it for the network. Critically analyse the result, by selecting three vulnerabilities, try to find suitable countermeasures to protect the system. Create a security document related to a different vulnerability discovered in your network, highlight your plan for mitigations, including cost/benefit analysis. Section C) Evaluate UFW, set the rules to drop ICMP, SMTP and FTP. Critically differentiate between IDS and IPS. Use Snort as IDS to detect ICMP, nmap , hping3, create your own rules to alert about any tcp connection from any external source to our ssh port. Support your work with codes and screenshots. Section D) Critically compare between the MSF and Armitage? Support your answer with examples. Give an example of using MSF to exploit a vulnerability in a remote system support your case with screenshots, try to show your ability in solving different technical issues. Module Learning Outcomes 1- Test the effectiveness of security policies and procedures. Breakdown of marks 15% 35% 25% 25% The wight of this work =100% of the total marks assigned to this module. Learning Resources Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press. Casey, E., 2011. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press. Kanellis, P. ed., 2006. Digital crime and forensic science in cyberspace. IGI Global. Stallings, W., Brown, L., Bauer, M.D. and Bhattacharjee, A.K., 2012. Computer security: principles and practice (pp. 978-0). Upper Saddle River (NJ: Pearson Education. Marty, R., 2009. Applied security visualisation (p. 552). Upper Saddle River: Addison-Wesley. Maurushat, A., 2019. Ethical Hacking. Nguyen, T.N., 2019, January. Certified ethical hacker v. 10 online course: a case study. In Proceedings of the 10th International Conference on E-Education, E-Business, E-Management and E-Learning (pp. 168-173). ACM |
Essay mills – SEC4102 SECURITY ANALYSIS PRACTICAL Essay writing services – My Assignment Online.
Pay someone to do my essays. It means that you are sure to receive a non-plagiarized, well-written, and researched essay with revision and money-back options. You can order essays, discussion, article critique, coursework, projects, case study, term papers, research papers, reaction paper, movie review, research proposal, capstone project, speech/presentation, book report/review, annotated bibliography, and more.
.WRITE MY ESSAY FOR ME NOW



