Order ready-to-submit essays. No Plagiarism Guarantee!
Note: All our papers are written from scratch by human writers to ensure authenticity and originality.
Computer Networks and Security
WE WRITE ESSAYS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your paper.
Write My Essay For MeSecurity Fundamentals2019/20
SEC4102
Assignment-
| ASSIGNMENT TITLE | SECURITY ANALYSIS PRACTICAL |
| PARAMETERS |
| Hand in date for this assignment is 18th May 2020 closing at 16.00hrs. Release date:03/02/2020. Work submitted must be your own unless the appropriate references are quoted within the text. Particular attention is drawn to the unfair means regulations which you have access to. For example, it is not permitted to have just a bibliography of references; if you use someone else’s material provide a citation in the text for all references used. Students who fail to submit assessments by the specified date (without an extension being granted or without accepted Mitigating Circumstances) will be subject to the following penalties: See Faculty Handbook for details: https://www.bolton.ac.uk/about/governance/policies/student-policies/ Please note that it is your responsibility to ensure that the assignment is submitted in the format/s specified in the Module Guide or on the Assessment Brief. Submit your assignment work via the Moodle Turnitin system. YOU SHOULD ALWAYS ENSURE YOU KEEP A COPY OF ANY ASSIGNMENT SUBMITTED BY WHATEVER METHOD In the case of exceptional and unforeseen circumstances, an extension of up to 5 days after the assessment submission deadline may be granted by your Programme Leader. Requests for extensions for periods longer than 5 days must be made using the Mitigating Circumstances procedures. Please see your Programme Handbook for further details. |
| DELIVERABLES |
| This part of the practice involves the writing up and processing of results obtained in Laboratory Sessions done in the course. Create your security case study by choosing a specific domain/s to do your penetration testing and risk assessments and countermeasures. Make sure to take permission before starting the assignment. Passive security artefacts, accepted, in the case of facing any difficulties obtaining the permissions. Section A) Explain in detail the difference between active reconnaissance and passive reconnaissance? Select a specific domain and perform the web search, google hacking, nslookup, Traceroute, Ping, Whois, Discover, Dig, FIERCE and maltego. Critically analyse the result and draw a clear picture of the targets (to secure/hack) Provide evidence of the reconnaissance work by providing screenshots /scripts. Section B) Scanning is a set of procedures for identifying live hosts, ports, and services, discovering the Operating system and architecture of the target system, Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organisation. Scanning refers to collecting more information using sophisticated and aggressive reconnaissance techniques Use nmap, zenmap, netscan, masscan. Scapy and hping3 tools from Kali Linux to scan Metasploit Virtual machine, Critically analyse the results show the open ports the services running on different ports and highlight on the advance features in nmap. Perform another sweep scanning on a specific network using the zenmap. Draw The network Topology. Support your report and analysis with screenshots, explain the policy and procedures the organisation should implement to reduce the impact of internal and external scanning.
Install and configure Nessus scanner on any platform to complete the vulnerability scanning on a single computer and then do it for the network. Critically analyse the result, by selecting three vulnerabilities, try to find suitable countermeasures to protect the system. Create a security document related to a different vulnerability discovered in your network, highlight your plan for mitigations, including cost/benefit analysis. Section C) Evaluate UFW, set the rules to drop ICMP, SMTP and FTP. Critically differentiate between IDS and IPS. Use Snort as IDS to detect ICMP, nmap , hping3, create your own rules to alert about any tcp connection from any external source to our ssh port. Support your work with codes and screenshots. Section D) Critically compare between the MSF and Armitage? Support your answer with examples. Give an example of using MSF to exploit a vulnerability in a remote system support your case with screenshots, try to show your ability in solving different technical issues. Module Learning Outcomes 1- Test the effectiveness of security policies and procedures. Breakdown of marks 15% 35% 25% 25% The wight of this work =100% of the total marks assigned to this module. Learning Resources Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press. Casey, E., 2011. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press. Kanellis, P. ed., 2006. Digital crime and forensic science in cyberspace. IGI Global. Stallings, W., Brown, L., Bauer, M.D. and Bhattacharjee, A.K., 2012. Computer security: principles and practice (pp. 978-0). Upper Saddle River (NJ: Pearson Education. Marty, R., 2009. Applied security visualisation (p. 552). Upper Saddle River: Addison-Wesley. Maurushat, A., 2019. Ethical Hacking. Nguyen, T.N., 2019, January. Certified ethical hacker v. 10 online course: a case study. In Proceedings of the 10th International Conference on E-Education, E-Business, E-Management and E-Learning (pp. 168-173). ACM |
Essay mill – SEC4102 SECURITY ANALYSIS PRACTICAL Essay writing service – My Assignment Online.
We take great pride in witnessing students excel in their assignments, whether they are expository or narrative essays. Our team of reliable writers boasts prestigious educational backgrounds from some of the top universities in America and Britain. Their professionalism has enabled them to produce thousands of plagiarism-free papers. Many students who have entrusted us with their “do my essay paper” requests have returned after experiencing the quality of our work.
Do not hesitate to say, “please help me with my essays.” It only demonstrates your wisdom in seeking the assistance of an expert who can refine your paper. Whether you need an original paper written from scratch or just someone to revise it for you, simply type “help with my paper.” Your success story will be one that many will admire, especially with the world-class grades you will achieve. Impress your tutor today with a top-notch paper that is free of grammatical or punctuation errors.


