Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
C2365S Ethical Hacking

Question:

Throughout this unit, you have learned the techniques for implementing attacks (by evaluating the various tools and methodologies) and proposed recommendations for securing vulnerable systems. This has been mostly focused on the exploitation of common or well-known vulnerabilities.

The National Institute of Standards (NIST) regularly maintains the National Vulnerability Database (NVD) of common vulnerabilities and exposures (CVEs).

For this task, you are required to investigate and evaluate a CVE published in the year 2020 and discuss the techniques for exploiting the weaknesses as well as proposing recommendations for securing the system. You will show the steps for exploiting this vulnerability using a standard penetration testing methodology.

You will need to view the NVD database

Your report should be 2000 +/- 10% words and will be assessed on the following

1.Introduction/ Background of the vulnerability (10%)

2.Risk Analysis/ Impact of the vulnerability (5%)

3.Limitations of the attack (5%)

4.An attack scenario/narrative using a penetration testing methodology (20%)

5.Techniques for implementing the attack (20%)

6.Defences against the attack/ Recommendations for securing the system (20%)

7.Conclusion (10%)

8.Presentation, structure, and good use of references (10%)

It is not compulsory to demonstrate practical exploitation of the vulnerability however your report must show a good understanding of how it is exploited including exploit code, tools, and other resources that can be used.

As below plus:

Excellent work that often shows some originality or creativity of insight and approach, is well-articulated and demonstrates a thorough understanding of the CVE, techniques, and limitations for implementing the attacks.

The report accurately evaluates the defences to the attack.

Well presented, well structured, good organisation with few or no errors in grammar, spelling, punctuation or presentation. Shows evidence of considerable research beyond the recommended textbooks and the Internet and the references are presented according to the Harvard APA 6th edition referencing style.

As below plus:

Very good work which reflects in a thorough, thoughtful and competent manner the CVE, techniques, limitations for implementing the attacks and defences with few errors or gaps in content, explanation or accuracy.

Well presented, clearly written, few errors in structure, organisation, expression, grammar, spelling, punctuation and presentation. Shows evidence of research and the references are presented according to the Harvard APA 6th edition referencing style.

A solid piece of work covering the basic aspects of the topic with an attempt that is coherent and demonstrates a good understanding of the CVE

Generally follows instructions regarding organisation, expression, grammar, spelling, punctuation and presentation. Shows evidence of some research and an attempt to present references according to the Harvard APA 6th edition referencing style.

Adequate descriptive work that demonstrates a basic grasp of the CVE Limited reflection using mainly provided material.

Limited prose style, limited attempt at following instructions regarding organisation, expression, grammar, spelling, punctuation and presentation. Shows evidence of little research outside of the material presented in the study sessions.

FAIL GRADES

Anything which is inadequate in most or all of the following: length, content, structure, organisation, expression, discussion, explanation, accuracy and relevance. Work in this range demonstrates an attempt to investigate, but is substantially inco mplete and deficient. Serious problems with a number of aspects of language use are often found in work in this range and the work may be severely under/over-length.

No serious attempt to reflect, and/or a serious misunderstanding of the requirements of the assignment. Acutely deficient in all aspects.

support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close