Develop a python script to scan all well-known ports

Assignment Help Computer Network Security
Reference no: EM133735228

Network Security Concepts

Short-answer questions

Question 1 Fundamental Knowledge :
Information security is becoming increasingly important due to the rising frequency of security attacks. As a cybersecurity engineer, it is essential to have a solid understanding of common information security terminology. Based on the knowledge you have acquired in the lecture, complete the table below by providing descriptions for the specified terms and relevant examples. Each incorrect item will result in a 0.5 mark deduction, up to a maximum of zero marks.

  • Term
  • Policy
  • Vulnerability
  • Threat
  • Threat actor
  • Asset
  • Attack
  • Countermeasure

Question 2 Trouble shooting ability:
A hash function is a one-way function used to transform data of arbitrary size into data of a fixed size. The output of a hash function is known as a hash value, hash code, digest, or fingerprint, which represents a unique signature of the original data. This signature can be used to verify data integrity and detect tampering.

For this question, you need to download the Python zipped file "Python-3.11.3.tgz" from Moodle and calculate its hash values using MD5, SHA1, and SHA256 algorithms. Then, compare the hashes with the given signature of "016ba65bc80411f9ec20c614ab385e81" to identify which hash algorithm was used for this signature.

Please find suitable scripts or tools for your computer to calculate the hash values. Windows users can use the "certutil" command in CMD or PowerShell.

Attach three screenshots to show how you obtain the hashes using MD5, SHA1 and SHA256 respectively and write down the hash values clearly in text format.
Identify which algorithm was used to generate the signature and explain its pros and cons. (2 marks)

Question 3 Self-study skills:

A CQU staff received the following email, which looks suspicious. Therefore, he reported it to CQU TASAC. Assuming you are a TASAC support specialist, please use your expertise to identify the type of cybersecurity threat it represents and provide your recommendations.

Explain what type of cybersecurity threat this email represents.

What actions would you recommend the staff undertake immediately?

Question 4 Problem solving skills:

Alice, a CQU student majoring in ICT, has collected some information from CQU website as follows. Could you help her answer the following questions?

What is the most likely purpose of this information?

Does the website employ encryption for security purposes? If so, what encryption algorithm is most likely used, and is it symmetric or asymmetric cryptography?

What is "SHA-256 Fingerprints" used for?

Question 5 Advanced Network Security skills:

The Institute for Future Farming Systems at CQUniversity operates a research web server (shown in the figure above) on cloud. The web server has recently been subjected to unusual attacks. As a senior network security engineer, you suspect that the web server may have left some ports open and vulnerable. However, you do not have the admin credentials to log in to the web server. Therefore, you have decided to develop a Python script to scan all the well-known ports and then offer your recommendations.

Please complete the following tasks:

Develop a Python script to scan all well-known ports ranging from 1 to 1024, execute the script, and determine which ports are open. Your answer should include a screenshot to show the Python script and a clear list of open port numbers.

Clarify the purpose of each open port and provide a recommendation on whether it should be closed or kept open.

Reference no: EM133735228

Questions Cloud

How the american economy influenced europes economy : Explain the growth of the American economy and determine how the American economy influenced Europe's economy starting in the 1950s and afterwards.
Employees to offer social environment for them to interact : Many companies hold a company picnic or "fun day" for employees to offer a social environment for them to interact.
How does the writer define key terms used in the argument : How does the writer define key terms used in the argument? How does the writer appeal to the reader's sense of logical reasoning?
Acquire medical benefits : The social worker helped Jazmine acquire medical benefits for her and her unborn baby, secure housing, and work towards a career she is passionate about
Develop a python script to scan all well-known ports : COIT12202 Network Security Concepts, CQ University - Explain what type of cybersecurity threat this email represents. What actions would you recommend
Explain the strategy-technique or procedure : Select one strategy, technique, or procedure (DTT) and explain the strategy, technique, or procedure.
What aspect of the games is augustus attempting to regulate : What aspect of the games is Augustus attempting to regulate? What do his rules tell us about the status of senators, soldiers and women in Roman society?
Preparing the budget most benefits the division : Which approach to preparing the budget most benefits the division, managers and stockholders?"
Reliability and accomplishment of the service : Friendly greetings by salespersons Creativity involved in the service Willingness to assist customers Reliability and accomplishment of the service.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd