Cyber security tools for network security

Assignment Help Computer Engineering
Reference no: EM133883234

Introduction to Cyber Security

Assessment - Proactive Security Measures

Type: Simulation and Report

Task

Demonstrate your understanding of key cyber security concepts aligned with learning outcomes LO2, LO3, and LO4. You will utilise open-source cyber security tools to assist an organisation with the Preparation stage of the Incident Response Lifecycle.
Additionally, this task allows you to use generative AI tools to assist in the process.

Learning outcome 1: Identify vulnerabilities and threats pertaining to the IT infrastructure of organisations.
Learning outcome 2: Recommend risk mitigation strategies to address cyber security vulnerabilities and threats.
Learning outcome 3: Analyse privacy, legal, ethical and security issues and solutions related to the IT infrastructure and use of technologies in organisations.

Assessment Description

This assessment is designed to simulate industry practices for using open-source cyber security tools for network security and threat detection. You will apply hands-on skills using the Elasticsearch, Logstash, Kibana (ELK) Stack, as well as Snort, which functions as both an intrusion detection system and intrusion prevention system (IDS/IPS).

This assessment is completed in two parts:

Part A: Tool configuration
Conduction during your Week 12 workshop.
You will configure security tools to meet four (4) specific objectives within 2.5 hours. These objectives would have been covered in Workshops 9 and 10.
At the end of the session, you will present your configurations to your learning facilitator for verification.

Part B: Documentation
You will submit a final report via myKBS by Week 13.
The report must include screenshots of configurations and brief explanations detailing how each objective was achieved.

Assessment Instructions

Preparation
Ensure you have your laptop with VirtualBox installed and a Linux Mint set up with ELK Stack and Snort. You should already have these tools from Workshops 9 and 10. Get online assignment help services Now!
Review Workshops 9 and 10 to understand:
The purpose of each tool
How to configure them to meet security objectives
Configuration - (Part A: In-Class Assessment)
Arrive early to your Week 12 class to settle in and receive final instructions. Ensure your laptop is fully charged.
You will be assigned four (4) objectives to configure.
For each objective:
Identify the relevant tool.
Configure the tool to meet the objective.
Once you have completed all four objectives, present your configurations to your learning facilitator.
After presenting, take clear screenshots of your work. Each screenshot must also capture:
The time and date (visible in your taskbar)
A text editor displaying your name and student number
Documentation - (Part B: myKBS Submission)
Compile your screenshots into a Microsoft Word file.
Separate the screenshots per objective and then provide a brief description of the configuration and what the outcome would be (i.e. How does the configuration meet the objective?).

Reference no: EM133883234

Questions Cloud

Which statement capture correct motive for oconnell practice : She wants to incorporate lessons that equip her student with skills for making friends. Which statement capture the correct motive for Ms. O'Connell's practice?
What could a teacher use for their learning targets : What could a teacher use for their central focus? What a teacher use for their learning targets? What prior knowledge would students already have prior to this?
Determine whether the client has problems with memory : As part of the mental status examination, the nurse also wanted to determine whether the client has problems with memory.
What does the quote mean : What does the quote: Polyvalence occurs when audience members share understandings of the denotations of a text but disagree about the valuation mean?
Cyber security tools for network security : Apply hands-on skills using the Elasticsearch, Logstash, Kibana (ELK) Stack, as well as Snort, which functions as both an intrusion detection system
Share why-why not you feel strategies used are applicable : Share Why/Why not you feel the strategies used are applicable for Today's Students in 2025? In your opinion do you feel Trauma Sensitive Schools are needetoday
Describe common mental health challenges : NURS 5164 Best Practice in Adolescent Mental Health, University of South Australia - Describe common mental health challenges experienced by adolescents
Introduction to reimbursement and coding course differently : How would you have approached the introduction to reimbursement and coding course differently?
How do systemic factors-like the cost of nursing homes : How do systemic factors-like the cost of nursing homes or hospital understaffing-affect a consumer's ability to make the "right" decision for a loved one?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd