Describe approaches to computer security

Assignment Help Computer Network Security
Reference no: EM132218495

Assessment Task - Problem Solving Task

Objectives of the assessment

The learning objectives of this assessment task are to:

ULO1 Describe approaches to computer security including access control, identity verification and authentication in order to minimize the cyber attacks on a system.
ULO4 Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks and malicious software that exists.

Cybersecurity Scenario

Welcome to Deakin Wargames, an interactive assessment of your knowledge and understanding of vulnerabilities relating to computer security, internet security and privacy.

This challenge requires you to work through ten levels, each of which contains a vulnerability. In order to progress to the next level, you must exploit this vulnerability to obtain a password which will grant you access to the next level.

Marks are allocated based on your ability to progress through each level as well as your understanding of the vulnerability and the recommendations you make on how to fix the issue. That is, you are expected to fully understand how you completed each level; this will be assessed through the problem solving task report.

Problem solving task report

Each student is to submit a report of approximately 2000 words and exhibits following the rubric provided. The report MUST include descriptions and evidence of results of the steps performed in order to be eligible to be awarded maximum marks for each rubric criterion.

You will note that the weighting is higher for levels 0-3 to enable everyone to pass. The levels then get more complex enabling you to decide what grade you want to achieve.

You are required to identify vulnerabilities and perform associated attacks to ultimately gain access to level 10 of the website. There are 5 vulnerabilities listed below covered by the 10 levels.

The name of the vulnerability that corresponds to each level is provided for you!

• Information Leakage
• Directory Traversal
• Weak Encryption
• Cookie Manipulation
• SQL Injection

The attached table provides guidelines on the information to be included for each vulnerability.

There needs to be 1 table completed per level.

Attachment:- Assessment_Task.rar

Reference no: EM132218495

Questions Cloud

Create a linear regression model in spss : Your goal is to create a regression model that can predict income based on age in years. Create a linear regression model in SPSS.
Develop a vision document for this project : Your task is to develop a Vision Document for this project. You are to describe the problem in your own words, and the capabilities and benefits.
In how many ways we can do synchronization in java : When a thread is executing a synchronized method , then is it possible for the same thread to access other synchronized methods of an object ?
Display the total monthly cost of these expenses : Display the total monthly cost of these expenses and the total annual cost of these expenses.
Describe approaches to computer security : SIT182- Real World Practices for Cybersecurity - Describe approaches to computer security including access control, identity verification and authentication
Ask the user to enter five floating point numbers : Write a program that asks the user to enter five floating point numbers, echo each to the screen, and then display the first number to 1 decimal place.
Discuss the accounting principles : Critically discuss the accounting principles and qualitative characteristics of useful financial information that were violated in the above case.
What is the company breakeven point in units : The Pramedia Company has three product lines of books- A, B, and C- with contribution margino $10, S8, and $4, respectively. The president foresees sales.
Advise jill regarding the income tax consequences : Advise Jill regarding the income tax consequences of the above transactions for her, in relation to the 2017/18 income year. In your answer, make sure.

Reviews

len2218495

1/18/2019 4:11:35 AM

• NO work is saved or backed up on the Website – Make sure you keep a record of your steps and findings! • Ensure you take screenshots of your work for evidence and that these are legible in your report. • To complete this assessment you will need to do research, read the information provided on the Website and covered the theory and practical material for weeks 5-9. • Your submission must be in a form readable by Microsoft Word.

len2218495

1/18/2019 4:11:23 AM

• NO EXTENSIONS allowed without medical or other certification. • LATE ASSIGNMENTS will automatically lose 5% per day up to a maximum of five days, including weekends and holidays. Assignments submitted 6 or more days late will not be marked and are given zero.

len2218495

1/18/2019 4:10:55 AM

This solution for this assessment cannot be directly found using a ‘Google’ search. You must understand this is a challenge and need to apply your knowledge and problem-solving skills to a series of cyber security concepts. Also, make sure you don’t share your progress or solutions with others. A guide has been provided as part of the resources for this assessment. It is important to understand that the assessment has been designed for everyone to pass. To achieve a higher grade is going to require a concerted effort by you.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd