Identify network threats using network security tools

Assignment Help Other Subject
Reference no: EM132121120

Network Security Assessment - Identify Network Threats using Network Security Tools

Purpose of the assessment - The objective of this assignment is to identify network threats using network security tools. The purpose of the assignment as per Unit Learning Outcomes:

  • Explain the major methodologies for secure networks and the threats they address.
  • Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description -

Network security is a process to secure the computer network system from all sorts of security threats, including threats to the physical set up. In this assignment, your task is to identify and evaluate network security threats that relate to network monitoring. You may, for example, investigate the network in the Institute, at your home or of the Internet by using any network security tool.

Use any TWO open source network monitoring and analysis tool mentioned below:

  • GFI LanGuard
  • PRTG
  • Nmap
  • Metasploit
  • TCPdump
  • Open VAS

After scanning the network, compare and discus results on the threats these tools could be used for network monitoring and analysis. Also provide appropriate mitigation and countermeasure strategies for the identified threats and vulnerabilities.

Section to be included in the report -

Introduction - Appropriately select a tool and discuss how it detects and exploit network vulnerabilities.

Literature Review - Related to your topic, discuss major methodologies related to network security threats and attacks.

Network Security Tools - Discuss how you identify and analyse network security threats. Provide detailed description of all threats with appropriate screenshots.

Threat Mitigation Techniques - Discuss in detail mitigation techniques for the selected vulnerabilities in your report.

Conclusion - Summarize your findings in report with valid comments.

Reference style - Appropriate IEEE referencing style and report presentation.

Verified Expert

The paper is prepared for Identification of Network Threats using Network Security Tools. NMAP and Open VAs are selected for the report and it is prepared for 1293 words excluding reference, bilbliography, title papge and table of content. The paper explains the major methodologies for secure networks and the threats they address. It identifies and report network threats, select and implement appropriate countermeasures for network security Font used: Calibiri, 11 pt, references are in IEEE format.

Reference no: EM132121120

Questions Cloud

Can studentid have a null value : Member(StudentId, OrganizationId, RoleId) stores the membership information of student joining organization.
Type of data help healthcare organizations : how does this type of data help healthcare organizations (both clinical and management) with their operations and quality initiatives
What network device or devices can be used to address : In relation to Internet connectivity, both you and the chemists at Plains Research are concerned about security.
Create for three separate triangles : Create (construct instances) for three separate triangles (tr1, tr2, tr3) and assign positive values to leg1 and leg2 for each tringle.
Identify network threats using network security tools : BN203 Network Security Assessment - Identify Network Threats using Network Security Tools, Melbourne Institute of Technology, Australia
Identify organisational information requirements : MN405 - Data model development and implementation - Model organisational information requirements using conceptual data modelling techniques
Explain how you expect this phase to impact : Discuss any "ah-hah" or breakthrough moments you experienced during this phase of the project.
Why sometime there are two recursion trees shown : Why sometime there are 2 recursion trees shown. why sometimes the work per level decreases from level to level, and it is constant in each level.
Write a solution to the red or blue computation : In the first half step of an iteration, any red color can move right one cell if the cell to the right is unoccupied (white);

Reviews

inf2121120

11/30/2018 10:37:30 PM

I have always received a satisfactory paper whenever your team has done asisgnments for me regardless of the deadlines rather short or long. A heartly felt thanks to the whole team of ExpertsMind from my side as they keep helping all the studenst from all around the world.

len2121120

9/24/2018 4:53:51 AM

Word limit 1000 – 1500. Submission Guidelines - All work must be submitted on Moodle by the due date along with a title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2121120

9/24/2018 4:53:45 AM

Submission Guidelines - Your report should include and discuss all the results in detail with appropriate screenshots. Report should investigate and show originality of work, and be different from others. Reference style - Appropriate IEEE referencing style and report presentation.

len2121120

9/24/2018 4:53:39 AM

Marking Rubric: Total Marks 50 - Introduction 3 marks - All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Literature Review 10 marks -Finding is clearly linked and well justified. Network Security Tools 20 marks -Exceptional discussion on security threats for the system with appropriate tools. Identifying highly sophisticated and well referenced vulnerabilities. Threat Mitigation Techniques 10 marks -Advance discussion on threats mitigation using latest technologies and procedures. Conclusion 2 marks - A very powerful conclusion with full confidence. Reference style 5 marks -Clear styles with excellent source of references.

Write a Review

Other Subject Questions & Answers

  How media broadcasting terrorist activity impact individuals

Analyze how media broadcasting terrorist activity and successes psychologically impact individuals (e.g., recovery teams, first responders, general population).

  Discuss peaceful transition to hegemony

Wilhelmite path to war, use course material to explore which scenario is the most likely and which is the least likely

  Why the lessons are meaningful to you

Three lessons you learned about critical thinking during HUM/115. Why the lessons are meaningful to you. How will you continue to apply these lessons in life?

  Formulate a plan to effectively integrate this product

You have been appointed as a new product manager with Samsung and have been tasked to introduce the latest smartphone in a new country. Choose and research a country other than the United States, and then formulate a plan to effectively integrate ..

  Write an essay on administrating a questionnaire

Write a 750-1000 word essay on constructing and administrating a questionnaire and its practical application in descriptive research.

  Summarize how victimization affects

Summarize how victimization affects

  How would you respond to your partner

A raid on a suspected military target went wrong, and your squad opened fire on several innocent people.

  Recruiting manager for a nonprofit

If you were a recruiting manager for a nonprofit, what screening tools would you use in narrowing a pool of candidates?

  How are alcohols oxidixed specifically with chromic acid

How are alcohols oxidixed specifically with chromic acid (CrO3). And what would be an example of an alcohol that is not readily oxidized by CrO3?

  What conclusions cannot be drawn from the study

What conclusions can be drawn from the study? What conclusions cannot be drawn from the study? What are some strengths and limitations of the research design?

  Is the second claim barred by the doctrine of res judicata

Pick one of these Supreme Court cases and tell us about it, and how the concept of collateral estoppel is involved. What does the Court say about collateral estoppel in your case? Does it make sense to you?

  Create a visual representation of your model

Create a visual representation of your model using a graphic organizer of your choice.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd