Analyse emerging security threats and controls

Assignment Help Other Subject
Reference no: EM132497942

ICT 205 Cyber Security - Kings Own Institute

Learning Outcome 1: Analyse and evaluate the organisational adoption of security controls
Learning Outcome 2: Design solutions for concrete security problems for distributed applications
Learning Outcome 3: Formulate and evaluate security countermeasures to reduce potential security risks
Learning Outcome 4:
Analyse emerging security threats and controls.

Assessment 1

Purpose: The purpose of this assignment is to assess student understanding on firewall design and configuration and students ability to exercise the operational, analytical and critical skills needed to reduce the potential security risks. Analyse and evaluate the organizational adoption of security controls.

Design solutions for concrete security problems for distributed applications This assessment contributes to learning outcomes a, b.

Assessment topic: Firewall Setup and Configuration

Task Details: This Assignment requires you to perform a security testing on the network to identify the threats, prepare a Risk Mitigation report and configure some of the firewall settings using Kali Linux to secure the network and the distributed applications.

The assignment consists of two parts:

Part A: Use Nmap - a security testing in Kali Linux to perform penetration testing on the network (features of Nmap listed below). Prepare a short Risk Mitigation plan to identify the threats for the assets. This plan will guide you to proceed with the firewall settings required for the organization as you focus on the second part of the assignment.

Part B: Configure a few settings on the firewall for the network using Kali Linux commands to achieve a required level of security. The initial set of commands are given to you to start with. You may need to perform online search to complete the rest of the requirements for the firewall settings.

Case Study for the Assignment: Canadian Cafe is a small business enterprise comprising franchise at different geographical locations with appropriate network facilities to reach their business requirements. A secure network across their geographical locations is one of the objectives of a business organization. The System and Network administrator of the organization realizes that the security of the network has to be addressed. it is necessary to impose certain level of filtering for the network to be secure and that is when it can sustain from attacks, which may damage the whole network. To develop a secure network, network administrators must have a good understanding of the attacks and appropriate mitigation techniques. It is necessary to identify the assets that need to be protected by performing a risk analysis, threats and vulnerabilities that the network may pose. After risk analysis, designing a set of security policies is very important to provide high level of security.

The executive management of Canadian Cafe urges you to design the necessary security requirements. Looking into the requirements of the security and adhering to information security policy as a security team decides to configure firewall to secure the network from different types of possible threats and attacks that can harm the business network.

Part A: Perform the following task.

1. Use Nmap from Kali on your Virtual Box

2. Write an introduction to include the description of the tool Features of Nmap:
• Host discovery: useful for identifying hosts in any network
• Port scanning: lets you enumerate open ports on the local or remote host
• OS detection: useful for fetching operating system and hardware information about any connected device
• App version detection: allows you to determine application name and version number
• Scriptable interaction: extends Nmap default capabilities by using Nmap Scripting Engine (NSE)

3. Demonstrate four tasks Nmap can perform. Discuss on how this tool can be used for mitigating differ types of threats. The discussion should include the name and brief description of the threat and must be supported by screenshots.

4. Discuss the performance of the tools based on the following:
a. Security features and
b. Time taken to detect any threat

5. Perform the firewall testing using Nmap

6. From the report generated from the above tasks write a short Risk Mitigation Plan to identity the type of threats on the organisation's assets.

Part B: Configure the following setting on the firewall using the appropriate commands in Kali Linux. The list of commands is provided below:

1. Check the firewall status
2. Enable or disable the firewall accordingly
3. Allow services such as TCP, SSH and samba using their port number or name
4. Verify the firewall rules after adding the above services
5. Secure a web server by blocking HTTP service and allowing HTTPS service only
6. Allow a range of ports from 20 to 80 and deny a range of ports from 100 to 500
7. Verify the firewall rules
8. Allow HTTP from a specific subnet to access your web services
9. Block connections to a network interface

Attachment:- CYBER SECURITY.rar

Reference no: EM132497942

Questions Cloud

How post while preparing budget analysis : Depreciation is $30,000 for October and $36,000 for November and December due to the purchase in November. How post while preparing Budget analysis
Make journal entry to record each of preceding transaction : Prepare journal entries to record each of the preceding transactions. Assume a perpetual inventory system. Evenflow had the following transactions for October
What is the firm cash flow per share ratio : Serenade Corp.'s cash flow last year was $1,112.27 million. The company has 117.73 million shares outstanding. What is the firm's cash flow per share ratio?
Prepare journal entries resulting from bank reconciliation : Prepare the journal entries resulting from the bank reconciliation. The company recorded a $1,764 cheque in payment of an account payable incorrectly
Analyse emerging security threats and controls : Analyse and evaluate the organisational adoption of security controls and Formulate and evaluate security countermeasures to reduce potential security risks
Prepare bank reconciliation for swingset company at march : Prepare the bank reconciliation for Swingset Company at March 31, 2022. prepare its bank reconciliation at the end of March 202
Find the return on equity is : Book Value (Shareholder's Equity) Per share of $15 and net income of $25 million. If the stock is currently trading at $30. The Return on Equity is
What in the financial break even : Assume a tax rate of 21% and cost of capital of 8%. What in the financial break even. PLEASE USE EXCEL WITH SOLUITONS!
Prepare the entries on the books of quebec to record : Prepare the entries on the books of Quebec to record the purchase of the patent on January 1, 2020, the legal defence of the patent in 2023

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd