New

Learn smart - Learn online. Upto 88% off on courses for a limited time. View Courses

Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

16 Pages
MARK1046 Marketing Today

Questions: You have been asked by your supervisor to buy some desktops and laptops. She asked you to compare prices for Dell and Apple desktops and laptops Specifically, she has said she wants 1 ...

Course

MARK1046

Type

Home Work

Subject

Networking

University

George Brown College

166 Pages
KF7023 Computer Networks and Operating Systems

Question: Learning Outcomes Addressed 1. Apply in-depth knowledge and demonstrate critical understanding of the concepts and  principles of computer networks and operating systems, including se ...

Course

KF7023

Type

Programming

Subject

Networking

University

University of Northampton

6 Pages
ECM84CS Information Security

1. Describe the basic principles of information security for the above educational institution. 2. Explain the role of conducting trainings and periodic awareness sessions with their contributions in ...

Course

ECM84CS

Type

Assignment

Subject

Networking

University

Middle East College

10 Pages
BIS 2001 It Infrastructure And Networking

Questions: Case study ABC Is an American institute of technology which has recently moved to Canberra .ABC has developed two mid-size campuses where both located in Canberra. The distance between the ...

Course

BIS2001

Type

Programming

Subject

Networking

University

Royal Melbourne Institute of Technology

Season

spring

IY4S707 Network Security

Question

Answered

Question:

1. To evaluate critically how services are delivered to one another in a secure manner and perform security management and configuration of a network and a distributed system;

2. To analyse, evaluate and synthesise methods by which computers within a distributed system communicate and appraise the threats and vulnerabilities that exists in a distributed system

Assessment Task:

Scenario:

You are acting in the role of a Network Security consultant for an organization. It has been brought to your attention suspicious activity occurred on a machine and may have been attacked.

Network traffic has been captured on the machine the machine has internet access, where the user appeared to be browsing websites along with inputting a username and password. Additionally, there is no IPv4 forwarding rules configured that permit traffic originating in the external network, that allow for forwarding onto the internal network. A PCAP file is provided of the incoming and outgoing connections.

You are requested to produce a report based upon your analysis of the PCAP file (provided separately):

Identify if a scan was conducted. If a scan had been conducted then:

·Identify the source of the scan, and whether this was an internal or external attack? Discuss why you think this may or may not have been the case? (5 marks)

·Identify if any of the ports were found to be open

·Was any sensitive information found, i.e. username, password.

·Reasoning and evidence of this along with the website address

·Was the login successful?

·List all the IP addresses identified along with the domain address

Note: Please be aware that all the above tasks must be supported with screenshots evidences of the filters that have been used along with adequate explanation *

Also, your report for this part should cover:

·Introduction and outline of the problem(s).

·Clarity in presentation of report. Appropriate format, punctuation and grammar.

·Bibliography and references to USW Harvard standard. journals try to back everything up.  

·Source of scan. – IP address of person who did the scan. Is scan internal or external. Explain how it is internal or external. If there’s a scan then there is attack. Discuss.

·Use tools – NMAP, Wireshark

·Need to find if any username or password from traffic?

·Are there any website addresses visited? Show all the website addresses, URLs for the websites.

·Was the log in successful?

·List all the IP addresses identified

*Need to include screenshots of filters used and explain/reflection.

Tips

1)Read the file

2)Sketch it out to understand

Part B (from content delivered by Dr Muhammad Usman)

Task 1: Carry out protocol analysis of any one security protocol (such as encryption, authentication, etc.). The protocol analysis should focus on at least two properties.

Task 2: You are hired as a security architect for a HealthTech organisation which provides Internet-of-Medical-Things driven micro-services to different healthcare service providers across the Wales regions. You are asked to carry out attack analysis of the part of the ICT infrastructure using IEEE 802.15.4 and ZigBee protocol stack. The names of the layers are PHY; MAC; Network and Application. Your analysis must elucidate following aspects:

·Name of an advance attack type with description regarding how that attack is launched on a particular layer.                              

·Your solution, within the context of the HealthTech organisation, to prevent from each of the above-mentioned attacks in the future.

·A detailed network diagram showing the locations of attacks within the ICT infrastructure of the HealthTech organisation.

Portfolio Requirements

Please mention how many words your report contains in on the cover page.

General Information

You are encouraged to use figures and tables (correctly labelled) within your report.  It should be presented in a standard academic format using numbered and headed sections, page numbers and Table of Contents.  An appendices section can be used if necessary. Where applicable it should include citations and quotes, referenced correctly using the USW Harvard referencing format and a reference page listing your sources.  

You should submit your report in PDF format.

IY4S707 Network Security

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

165 More Pages to Come in This Document. Get access to the complete answer.

MyAssignmenthelp.com strives to deliver quality content to students of USA and deliver assignment writing services as per individual assignment assistance. We have built up a pool of 3800+ assignment experts who provide academic writing help in more than 100+ subjects. Our skilled and experienced assignment writers deliver custom-made assistances, and they offer need-based university assignment help to students as per their assignment demands.

More IY4S707 IY4S707 Network Security: Questions & Answers

Q
icon

We aren't endorsed by this University

MARK1046 Marketing Today

Questions: You have been asked by your supervisor to buy some desktops and laptops. She asked you to compare prices for Dell and Apple desktops and laptops Specifically, she has said she wants 1 desktop computer, 5 laptop computers, one color LaserJet and on desk jet printer: Section One Let ...

View Answer
Q
icon

We aren't endorsed by this University

KF7023 Computer Networks and Operating Systems

Question: Learning Outcomes Addressed 1. Apply in-depth knowledge and demonstrate critical understanding of the concepts and  principles of computer networks and operating systems, including security, and their  application in a range of current and emerging technologies. Intellectual / ...

View Answer
Q
icon

We aren't endorsed by this University

ECM84CS Information Security

1. Describe the basic principles of information security for the above educational institution. 2. Explain the role of conducting trainings and periodic awareness sessions with their contributions in minimizing opportunities for internal and external threats. 3. Discuss different information secur ...

View Answer
Q
icon

We aren't endorsed by this University

BIS 2001 It Infrastructure And Networking

Questions: Case study ABC Is an American institute of technology which has recently moved to Canberra .ABC has developed two mid-size campuses where both located in Canberra. The distance between the two campuses is 2 km. The first campus dimension is 1000 meters length and 600 meters width. The se ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?