Analyze the protocols on two different operating systems

Assignment Help Computer Engineering
Reference no: EM133642255

Homework: Threat Interception Project

Overview

When accessing the Internet via wireless methodologies, a certain level of protection has been granted to the users. This protection is largely due to the many types of security protocols that have been developed. Without these different security protocols, users would not be able to engage in the activity that they have become accustomed to on the Internet. In order to preserve this freedom with which users utilize the Internet, IT professionals must have both a thorough understanding of the primary forms of security protocols as well as how each security protocol functions.

One of the best methods that can be utilized to minimize security threats is by intercepting these attacks before they are successfully utilized. Three security protocols that are used to achieve this include Transport Layer Security (TLS), Secure Sockets Layer (SSL), and Private Communications Transport (PCT). Do any other security protocols exist? Research one additional modern security protocol and add this to your analysis.

Instructions

Assume that you are the information security officer of a business, and you must evaluate these four security protocols in order to determine which should be implemented in your organization. Analyze the protocols on at least two different operating systems from a threat interception standpoint. Use current threat and vulnerability data when performing this assessment. US-CERT, the United States Computer Emergency Readiness Team, is one example of a U.S. Department that has information on current threats to information systems. Regardless, many other public and private sector organizations can be used as long as they are credible.

In order to perform this analysis, if you do not have access to two different physical workstations with different operating systems, it is recommended you use virtual machines. VMware and Oracle VirtualBox are examples. Search for either and download them free of charge. Subsequently, you can use open source pre-built images or install from the operating system ISO images. For instance, Kali Linux is a popular operating system that has the tools to do this analysis. Search "Kali Linux VirtualBox Image" to find a virtual box image pre-installed with Kali Linux.

In your analysis, be sure to assess the threats that each protocol is likely to mitigate or prevent and evaluate the strengths and weaknesses associated with each of these protocols. Be sure to include the following in your project:

A. A properly formatted APA paper;

B. Screenshots with visible OS dates of the network security threat assessments on the two different operating systems, at least one OS being Linux, using relevant security tools on Kali Linux or Linux alternatives;

C. Justification and use of appropriate security tools to demonstrate and evaluate the vulnerability of intercepting information from each of the four networking protocols;

D. A review of which safeguards the organization could implement to guard against these attacks, and

E. A well supported report regarding the most advantageous safeguard/mitigating factors of the network security threats your project addresses;

F. Hint: Create Microsoft Excel spreadsheets that list the operating systems, security assessments, tools used, four networking protocols, and findings from the threat interceptions that occurred;

G. Your project must be a minimum of 1,800 words and must contain at least 7 peer-reviewed sources;

H. Before being graded, all code, security tool logs/reports, server logs, access control rules, and diagrams (each) must include screenshots with a valid OS date/timestamp and a unique piece of data that shows completion on the student's Kali Linux distribution or relevant alternative security OS. Include the screenshots in appendices in your written paper.

Reference no: EM133642255

Questions Cloud

Strategic management specialist : Jaime is a strategic management specialist who uses a tool to assess the competitiveness and structure of all the urology practices in his state.
Calculate the sum of the two variables left and right : COSC 2425- Calculate the sum of the two variables left and right. Define a character string called message that contains the characters, Hello World!.
How might development of skills : How might development of skills you feel you lack help you to become better leader? How do you feel skills you possess will support you in your leadership?
How controlling processes can affect project integration : Explain how controlling processes can affect project integration, scope, time, cost, quality, and especially risk.
Analyze the protocols on two different operating systems : Analyze the protocols on at least two different operating systems from a threat interception standpoint.
Explain your approach to minimizing your companys impact : Explain your approach to minimizing your company's impact on the environment, considering all aspects of your operations.
Explain their customer engagement marketing strategy : Discuss a company with which you have had a good brand experience. Explain their customer engagement marketing strategy.
Provide one example each of known known you have encountered : Define and provide one example each of a known known, known unknown, and unknown unknown you have encountered on previous projects.
Identify method to protect your and your family in the event : Discuss options and identify methods to protect your and your family in the event of sudden loss of life or catastrophic hardship (ie disability).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd