Reference no: EM132218495
Assessment Task - Problem Solving Task
Objectives of the assessment
The learning objectives of this assessment task are to:
ULO1 Describe approaches to computer security including access control, identity verification and authentication in order to minimize the cyber attacks on a system.
ULO4 Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks and malicious software that exists.
Cybersecurity Scenario
Welcome to Deakin Wargames, an interactive assessment of your knowledge and understanding of vulnerabilities relating to computer security, internet security and privacy.
This challenge requires you to work through ten levels, each of which contains a vulnerability. In order to progress to the next level, you must exploit this vulnerability to obtain a password which will grant you access to the next level.
Marks are allocated based on your ability to progress through each level as well as your understanding of the vulnerability and the recommendations you make on how to fix the issue. That is, you are expected to fully understand how you completed each level; this will be assessed through the problem solving task report.
Problem solving task report
Each student is to submit a report of approximately 2000 words and exhibits following the rubric provided. The report MUST include descriptions and evidence of results of the steps performed in order to be eligible to be awarded maximum marks for each rubric criterion.
You will note that the weighting is higher for levels 0-3 to enable everyone to pass. The levels then get more complex enabling you to decide what grade you want to achieve.
You are required to identify vulnerabilities and perform associated attacks to ultimately gain access to level 10 of the website. There are 5 vulnerabilities listed below covered by the 10 levels.
The name of the vulnerability that corresponds to each level is provided for you!
• Information Leakage
• Directory Traversal
• Weak Encryption
• Cookie Manipulation
• SQL Injection
The attached table provides guidelines on the information to be included for each vulnerability.
There needs to be 1 table completed per level.
Attachment:- Assessment_Task.rar
|
Create a linear regression model in spss
: Your goal is to create a regression model that can predict income based on age in years. Create a linear regression model in SPSS.
|
|
Develop a vision document for this project
: Your task is to develop a Vision Document for this project. You are to describe the problem in your own words, and the capabilities and benefits.
|
|
In how many ways we can do synchronization in java
: When a thread is executing a synchronized method , then is it possible for the same thread to access other synchronized methods of an object ?
|
|
Display the total monthly cost of these expenses
: Display the total monthly cost of these expenses and the total annual cost of these expenses.
|
|
Describe approaches to computer security
: SIT182- Real World Practices for Cybersecurity - Describe approaches to computer security including access control, identity verification and authentication
|
|
Ask the user to enter five floating point numbers
: Write a program that asks the user to enter five floating point numbers, echo each to the screen, and then display the first number to 1 decimal place.
|
|
Discuss the accounting principles
: Critically discuss the accounting principles and qualitative characteristics of useful financial information that were violated in the above case.
|
|
What is the company breakeven point in units
: The Pramedia Company has three product lines of books- A, B, and C- with contribution margino $10, S8, and $4, respectively. The president foresees sales.
|
|
Advise jill regarding the income tax consequences
: Advise Jill regarding the income tax consequences of the above transactions for her, in relation to the 2017/18 income year. In your answer, make sure.
|