Evaluate a network security software

Assignment Help Computer Network Security
Reference no: EM131308443

Assignment Description

Assignment Overview

For this assignment you will evaluate a Network Security Software. Marks will be awarded based on the sophistication and the difficulties the demonstration explored.

Your task is to complete and make a 4-5 min video presentation on the following:

1. Download and install (on your computer or on MIT Virtual box) a Network SecuritySoftware assigned to you from Table 1.

2. Demonstrate (narration of your actions recorded by video) 4 tasks the software can perform.

3. Overview of your presentation.

4. Summarize your findings.

5. Present the results in a video presentation.

6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion.

Length of Video:Introduction (30 secs, your appearance should be in the video) + Outline of the presentation (30 secs) + Demonstration of the task (210 seconds) + Summary (15 seconds) + Conclusion (15 secs, with appearance)

[You can choose a network security tool for your demonstration with your tutor's consent].

Table 1 Network Security Tools

Serial #

Name of the Software

Description

1

Nmap

map your network and ports with the number one port scanning tool. Nmap now features powerful NSE scripts that can detect vulnerabilities, misconfiguration and security related information around network services. After you have nmap installed be sure to look at the features of the included ncat - its netcat on steroids

2

Metasploit Framework

Test all aspects of your security with an offensive focus. Primarily a penetration testing tool, Metasploit has modules that not only include exploits but also scanning and auditing.

3

OpenSSH

Secure all your traffic between two points by tunnelling insecure protocols through an SSH tunnel. Includes scp providing easy access to copy files securely. Can be used as poor mans VPN for Open Wireless Access points (airports, coffee shops). Tunnel back through your home computer and the traffic is then secured in transit. Access internal network services through SSH tunnels using only one point of access. From Windows, you will probably want to have putty as a client and winscp for copying files. Under Linux just use the command line ssh and scp.

4

BackTrack

an Ubuntu based Linux distribution that is configured with hundreds of security testing tools and scripts. Backtrack is well known with penetration testers and hobbyists alike.

5

Nikto

A web server testing tool that has been kicking around for over 10 years. Nikto is great for firing at a web server to find known vulnerable scripts, configuration mistakes and related security problems. It won't find your XSS and SQL web application bugs, but it does find many things that other tools miss. To get started try the Nikto Tutorial or the online hosted version.

You may use any of the available open source software for screen capture. Please find the following as an example.

• Software:- https://camstudio.org/
• Tutorial:- https://www.youtube.com/watch?v=jVnBnvXJw00

Reference no: EM131308443

Questions Cloud

External environment scanning process : Discuss five trends in the external environment scanning process that will affect most businesses.
Advice on the reliance of financial ratios analysis : Advice on the reliance of financial ratios analysis and budgetary controls for co-ordination and control of the group performance. Critical analysis of the company's management accounting function and ethical issues in the face of "Brexit" decisions..
Show all the commands and responses : In FTP, a user (Jan) wants to make a new directory called Jan under the directory /usr/usrs/letters. Show all of the commands and responses.
Logistics planning strategy : Analyze the trade offs (benefits and risks) associated with an aviation fuel consortia and discuss your justification for using or not using this logistics planning strategy.
Evaluate a network security software : For this assignment you will evaluate a Network Security Software. Marks will be awarded based on the sophistication and the difficulties the demonstration explored.
Show that ftp is an insecure file transfer protocol : The data connection is opened and then closed for each file transfer activity. We also show that FTP is an insecure file transfer protocol because the transaction is done in plaintext.
Firm can deduct the interest paid for tax purposes : On January 1, 2012, your brother's business obtained a 30-year amortized mortgage loan for $250,000 at a nominal annual rate of 4.35%, with 360 end-of-month payments. The firm can deduct the interest paid for tax purposes. What will the interest dedu..
Expenditure budget for the upcoming year : Sespi is a manufacturer of aerated drinks such as colas and other beverages. The finance department is planning to table a capital expenditure budget for the upcoming year. Which of the following items might be accounted for under this budget?
Investigate smtp protocol in action : We send an e-mail and, using Wireshark, we investigate the contents and the format of the SMTP packet exchanged between the client and the server. We check that the three phases we discussed in the text exist in this SMTP session.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Mobile wireless networks

3G Safekeeping model, safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, access points (AP), network admission controller (NAC) and authentication server (AS)

  How can hacking into a company''s system put at risk

Write a few words on how this research connects to the claims and PowerPoint thesis. Write a conclusion statement, which includes a short summary

  Strategy for dealing with the risk

For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)

  Two security vulnerabilities the connection may have

When securing the modern enterprise, consider that IT systems do not operate alone. Note two security vulnerabilities the connection may have and two to four ways each vulnerability could be potentially exploited.

  Why and how would you suggest testing security

Why and how would you suggest, testing security? How do you recommend protecting your environment from malicious software?

  Limits of information privacy

Question 1: Does the governments have the right to go our information privacy? Question 2: What is the limits of information privacy?

  Which displacement produces largest number of coincidences

Use displacements of 5 and 6. Which displacement produces the largest number of coincidences? Find the key. Find the plaintext.

  Describe how bob can recover the message

Describe how Bob can recover the message - Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?

  Decrypt message using caesar rot-three substitution cipher

Decrypt the message "F R Q J U D W X O D W L R Q V B R X J R W L W" using the Caesar ROT3 substitution cipher.

  Explain what is meant by authentication

In the context of information processing, computer security and trusted systems, explain what is meant by the following terms and why we want to use them: Authentication and Two factor authentication

  Incident and crime scene procedures

Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.

  Define ethical issues related to information technology

Locate a news article based on a recent event on ethical issues related to information technology. For example, Wikileaks, Snowden, etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd