Demonstrate an advanced network security solution

Assignment Help Computer Network Security
Reference no: EM133868376 , Length: word count:2500

Network & Information Security

Assessment - Introduction
This group assessment, consisting of two parts, Project Report and Project Demonstration.

This group project requires teams of 3-4 students to design, implement, and demonstrate an advanced network security solution. You will focus on enhancing your pfSense firewall with a robust Intrusion Detection and Prevention System (IDPS) using Snort.

The group leader will submit the Project Report to the LMS. The rest of the group members should submit the "Individual participation form".

The group will prepare a face-to-face presentation to demonstrate the system's defenses. The group leader will also submit the Project PowerPoint presentation to the LMS. The rest of the group members should submit the "Individual participation form".

Project Report (Group)
Advanced IDPS Configuration (Building on Labs 5-7):
Extend your existing pfSense setup from previous labs with advanced Snort configurations.
Develop custom Snort rules tailored to detect specific threats relevant to your virtual network environment.
Implement and configure Snort templates to enhance detection capabilities.
Document your network topology, including all virtual machines and network configurations.
Create detailed documentation of your custom Snort rules, explaining their purpose and functionality.
Provide screenshots of your experiments.

IDPS Testing and Validation:
Develop comprehensive test cases to validate the effectiveness of your Snort rules.
Simulate various attack scenarios to trigger your Snort rules and demonstrate the IDPS's detection and prevention capabilities.
Capture and analyze Snort logs and alerts to evaluate the performance of your IDPS.
Document the test cases, attack simulations, and analysis of Snort logs and alerts.
Provide screenshots of your experiments.
Project Report and Documentation:
Compile a comprehensive report that includes:
Network topology and configurations.
Detailed documentation of custom Snort rules and templates.
Test cases, attack simulations, and analysis of Snort logs and alerts.
Analysis of the effectiveness of the implemented security measures.
Discussion of challenges encountered and solutions implemented.
Screenshots of your experiments.
Ensure the report is well-organized, clearly written, and professionally formatted.
Project Demonstration (Group)
Face-to-Face Presentation and Demonstration:
Prepare a face-to-face presentation to demonstrate the working defenses of your system.
Showcase the functionality of your custom Snort rules and the IDPS's ability to detect and prevent attacks.
Be prepared to answer questions from the instructor and classmates.
Each member of the group must actively participate in the presentation and demonstration.

Reference no: EM133868376

Questions Cloud

What would the nurse include in the plan of care : The nurse is caring for a school-aged child hospitalized with an infectious disease. What would the nurse include in the plan of care?
Respiratory system-why is antibiotic not prescribed : This portion of the case study is relevant to the respiratory system, Why is an antibiotic not prescribed?
How many ml of intake on the clients record : A nurse is calculating the total fluid intake for a client during a 4-hr period. The nurse should record how many mL of intake on the client's record?
How many ml should the nurse administer per dose : A nurse is preparing to administer labetalol 80 mg IV push every 10 minutes for a client with hypertension. How many mL should the nurse administer per dose?
Demonstrate an advanced network security solution : ITNE2002 Network & Information Security, Victorian Institute of Technology - Implement and configure Snort templates to enhance detection capabilities
How many ml should the nurse prepare to administer per dose : A nurse is preparing to administer Amoxil (amoxicillin) suspension 180 mg daily in two divided. How many mL should the nurse prepare to administer per dose?
Which is not neural adaptations that improve strength : During the early stages of resistance training, strength gains are primarily due to adaptations. Which is not neural adaptations that improve strength?
What you need to do now that emma has disclosed information : Emma Emma is usually upbeat and a delight to work with. Today she seems a bit down. Explain what you need to do now that Emma has disclosed this information.
How many tablets should the nurse administer : A nurse is preparing to administer diltiazem (Cardizem) 90 mg PO three times daily for a client with hypertension. How many tablets should the nurse administer?

Reviews

len3868376

5/14/2025 12:07:07 AM

Inside the pdf file could you please check if assessment 4 can be done by you or not. I think I need the report and presentation slides following all the instructions and please let me know if anything else i need.Bro one more thing could please give. doc file like what we should explain in the presentation and what questions the teacher may ask?

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd