Reference no: EM133735228
Network Security Concepts
Short-answer questions
Question 1 Fundamental Knowledge :
Information security is becoming increasingly important due to the rising frequency of security attacks. As a cybersecurity engineer, it is essential to have a solid understanding of common information security terminology. Based on the knowledge you have acquired in the lecture, complete the table below by providing descriptions for the specified terms and relevant examples. Each incorrect item will result in a 0.5 mark deduction, up to a maximum of zero marks.
- Term
- Policy
- Vulnerability
- Threat
- Threat actor
- Asset
- Attack
- Countermeasure
Question 2 Trouble shooting ability:
A hash function is a one-way function used to transform data of arbitrary size into data of a fixed size. The output of a hash function is known as a hash value, hash code, digest, or fingerprint, which represents a unique signature of the original data. This signature can be used to verify data integrity and detect tampering.
For this question, you need to download the Python zipped file "Python-3.11.3.tgz" from Moodle and calculate its hash values using MD5, SHA1, and SHA256 algorithms. Then, compare the hashes with the given signature of "016ba65bc80411f9ec20c614ab385e81" to identify which hash algorithm was used for this signature.
Please find suitable scripts or tools for your computer to calculate the hash values. Windows users can use the "certutil" command in CMD or PowerShell.
Attach three screenshots to show how you obtain the hashes using MD5, SHA1 and SHA256 respectively and write down the hash values clearly in text format.
Identify which algorithm was used to generate the signature and explain its pros and cons. (2 marks)
Question 3 Self-study skills:
A CQU staff received the following email, which looks suspicious. Therefore, he reported it to CQU TASAC. Assuming you are a TASAC support specialist, please use your expertise to identify the type of cybersecurity threat it represents and provide your recommendations.
Explain what type of cybersecurity threat this email represents.
What actions would you recommend the staff undertake immediately?
Question 4 Problem solving skills:
Alice, a CQU student majoring in ICT, has collected some information from CQU website as follows. Could you help her answer the following questions?
What is the most likely purpose of this information?
Does the website employ encryption for security purposes? If so, what encryption algorithm is most likely used, and is it symmetric or asymmetric cryptography?
What is "SHA-256 Fingerprints" used for?
Question 5 Advanced Network Security skills:
The Institute for Future Farming Systems at CQUniversity operates a research web server (shown in the figure above) on cloud. The web server has recently been subjected to unusual attacks. As a senior network security engineer, you suspect that the web server may have left some ports open and vulnerable. However, you do not have the admin credentials to log in to the web server. Therefore, you have decided to develop a Python script to scan all the well-known ports and then offer your recommendations.
Please complete the following tasks:
Develop a Python script to scan all well-known ports ranging from 1 to 1024, execute the script, and determine which ports are open. Your answer should include a screenshot to show the Python script and a clear list of open port numbers.
Clarify the purpose of each open port and provide a recommendation on whether it should be closed or kept open.